Security Report Summary
C
Site: http://linuxprotraining.com/ - (Scan again over https)
IP Address: 174.48.114.212
Report Time: 26 Apr 2017 13:54:13 UTC
Report Short URL: https://schd.io/K08
Headers:
  • X-Frame-Options
  • X-XSS-Protection
  • X-Content-Type-Options
  • Content-Security-Policy
  • Referrer-Policy
Raw Headers
HTTP/1.1200 OK
Servernginx
DateWed, 26 Apr 2017 13:46:33 GMT
Content-Typetext/html;charset=utf-8
Content-Length21612
Connectionkeep-alive
X-Cache-Operationplone.app.caching.strongCaching
Content-Languageen-us
ExpiresThu, 27 Apr 2017 13:46:33 GMT
X-Ua-CompatibleIE=edge
Cache-Controlmax-age=86400, proxy-revalidate, public
X-Cache-Ruleplone.content.itemView
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=15768000; includeSubDomains
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Missing Headers
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Other Services
Applause You’re on the right track! Do you want to improve your security even further? Our friends at Applause are happy to help.
Upcoming Headers
Expect-CTExpect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
Additional Information
ServerThis Server header seems to advertise the software being run on the server but you can remove or change this value.
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS. That said, the HSTS header must not be returned over a HTTP connection, only HTTPS.
X-XSS-ProtectionX-XSS-Protection sets the configuration for the cross-site scripting filters built into most browsers. The best configuration is "X-XSS-Protection: 1; mode=block".
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".