Tighten up sshd config in admin MFSes
Based on latest Qualys report, it appears we are getting reported for SSH1 being enabled in the admin MFS. Need to ensure:
Protocol 2
UsePAM no
PasswordAuthentication no
ChallengeResponseAuthentication no
PermitRootLogin without-password
Not sure what we can do about valid ciphers given the age of the sshd in the MFSes.