WAKE UP
The Wake-On-LAN function is used to wake a computer from its shutdown or sleep state in order to start the computer's operating system and enable network activity.
Some systems, such as SCCM, can use it to wake up computers to install patches at set times.
However, Wake-on-LAN has many risks: However, Wake-on-LAN has n* Bounce attacks: attackers can use Wake-on-LAN to bounce their attack to a target computer through a third-party computer, making the origin of the attack difficult to locate.
Replay attacks: attackers can capture data packets sent to wake up a computer and replay them later to wake up the computer without authorization.
Denial of service attacks: attackers can send multiple Wake-on-LAN packets to a computer to wake it up continuously, which can lead to network overload and service interruption.
Packet injection attacks: attackers can inject malicious Wake-on-LAN packets that can execute malicious code on the target computer.
Information leakage: If Wake-on-LAN packets contain sensitive information, such as passwords, they can be intercepted and compromise the security of the target computer.
Broadcast use: these packets can be filtered by routers (which limit broadcast domains) and can prevent the Wake-on-LAN from working properly.udges.
Therefore, it is recommended to:
Disable this option if no tool uses it
WAKE ON TIMER
When a computer model does not support Wake On LAN, this feature can be used as a stopgap measure to ensure that patch management systems can contact the computer more reliably by booting the workstation at a set time.
For this reason, it is recommended to:
Disable this option if no tool uses it
Last updated