• +886-4-23582340
  • +886-4-23596771
  • winnexus@ct-cloud.com.tw

GCB Module Management

GCB Module Management

What is GCB?


GCB is the abbreviation of Government Configuration Baseline.
  The purpose of GCB is to standardize the consistent security settings (such as password length, update period, etc.) of information and communication equipment (such as personal computers, server hosts, and Netcom equipment, etc.), so as to reduce the risk of becoming a hacker intrusion channel and causing information security incidents。 TWGCB refers to the setting value specified by the US government configuration benchmark for the Taiwan computer system environment.
  As a co-supply contract manufacturer, WinNexus-GCB module independently developed by Chengyun Technology can detect and apply GCB to the PC of government agencies and units, and display the application of GCB in the form of graphs to test whether the endpoint device complies with the TWGCB group. It is a powerful tool for agencies to conduct GCB import, GCB detection, GCB verification and other work.
Website link:行政院國家資通安全會報技術服務中心

TWGCB
  • Account Policy:Detect configurations such as password policy, password length, and account lockout policy.
  • Computer Settings:Detects configurations such as security options, user authorization assignments, Internet communication settings, autoplay, etc.
  • Firewall Settings:Windows Firewall public profiles, private profiles, domain profiles and other configurations are detected.
  • User Settings:User screen saver, Internet communication, network sharing, attachment manager and other configurations are checked.
  • Internet Explorer:Internet Explorer's internal network area, trusted website area and other areas are checked for configuration such as JAVA permissions, login options, Active X control items and other configuration files.
  • Google Chrome:Detects configurations such as Google Chrome content settings, HTTP authentication policies, password managers, setting remote access options, extensions, etc.
  • Microsoft Edge:Check Microsoft Edge Computer Settings configuration in privacy and security, browser experience, extensions, developer tools, etc.

  • Exception management: When the configuration settings of the organization are different from the items listed in the "Government Configuration Reference Document" announced by the Technical Service Center, they must be included in the exception management to control the possible risks. If it is not listed in the "Government Configuration Baseline Document", it does not need to be included in the exception management.