Microsoft IIS 10.0 Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +2 ✎ 2
Comparison against the immediately-prior release (V2R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 2
Content changes 2
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- IIST-SV-000100
- Vuln IDs
-
- V-218784
- V-100103
- Rule IDs
-
- SV-218784r561041_rule
- SV-109207
Checks: C-20256r310827_chk
If web administration is performed at the console, this check is NA. If web administration is performed remotely the following checks will apply: If administration of the server is performed remotely, it will only be performed securely by system administrators. If website administration or web application administration has been delegated, those users will be documented and approved by the ISSO. Remote administration must be in compliance with any requirements contained within the Windows Server STIGs, and any applicable Network STIGs. Remote administration of any kind will be restricted to documented and authorized personnel. All users performing remote administration must be authenticated. All remote sessions will be encrypted and utilize FIPS 140-2-approved protocols. FIPS 140-2-approved TLS versions include TLS V1.1 or greater. Review with site management how remote administration is configured on the website, if applicable. If remote management meets the criteria listed above, this is not a finding. If remote management is utilized and does not meet the criteria listed above, this is a finding.
Fix: F-20254r310828_fix
Ensure the web server administration is only performed over a secure path.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001462
- Version
- IIST-SV-000102
- Vuln IDs
-
- V-218785
- V-100105
- Rule IDs
-
- SV-218785r561041_rule
- SV-109209
Checks: C-20257r310830_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Click the "Logging" icon. Under Format select "W3C". Click "Select Fields", verify at a minimum the following fields are checked: Date, Time, Client IP Address, User Name, Method, URI Query, Protocol Status, and Referrer. If not, this is a finding.
Fix: F-20255r310831_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Click the "Logging" icon. Under Format select "W3C". Select the following fields: Date, Time, Client IP Address, User Name, Method, URI Query, Protocol Status, and Referrer. Under the "Actions" pane, click "Apply".
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- IIST-SV-000103
- Vuln IDs
-
- V-218786
- V-100107
- Rule IDs
-
- SV-218786r561041_rule
- SV-109211
Checks: C-20258r310833_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 server name. Click the "Logging" icon. Under Log Event Destination, verify the "Both log file and ETW event" radio button is selected. If the "Both log file and ETW event" radio button is not selected, this is a finding.
Fix: F-20256r310834_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 server name. Click the "Logging" icon. Under Log Event Destination, select the "Both log file and ETW event" radio button. Under the "Actions" pane, click "Apply".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- IIST-SV-000109
- Vuln IDs
-
- V-218787
- V-100109
- Rule IDs
-
- SV-218787r561041_rule
- SV-109213
Checks: C-20259r310836_chk
Interview the System Administrator to review the configuration of the IIS 10.0 architecture and determine if inbound web traffic is passed through a proxy. If the IIS 10.0 web server is receiving inbound web traffic through a proxy, the audit logs must be reviewed to determine if correct source information is being passed through by the proxy server. Follow this procedure for web server and each website: Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Click the "Logging" icon. Click on "View log files" under the "Actions" pane. When the log file is displayed, review source IP information in log entries and verify the entries do not reflect the IP address of the proxy server. If the website is not behind a load balancer or proxy server, this is Not Applicable. If the log entries in the log file(s) reflect the IP address of the proxy server as the source, this is a finding. If provisions have been made to log the client IP via another field (i.e., utilizing X-Forwarded-For), this is not a finding.
Fix: F-20257r310837_fix
Access the proxy server through which inbound web traffic is passed and configure settings to pass web traffic to the IIS 10.0 web server transparently.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- IIST-SV-000110
- Vuln IDs
-
- V-218788
- V-100111
- Rule IDs
-
- SV-218788r561041_rule
- SV-109215
Checks: C-20260r310839_chk
Access the IIS 10.0 web server IIS Manager. Click the IIS 10.0 web server name. Under "IIS", double-click the "Logging" icon. Verify the "Format:" under "Log File" is configured to "W3C". Select the "Fields" button. Under "Custom Fields", verify the following fields have been configured: Request Header >> Connection Request Header >> Warning If any of the above fields are not selected, this is a finding.
Fix: F-20258r310840_fix
Access the IIS 10.0 web server IIS Manager. Click the IIS 10.0 web server name. Under "IIS", double-click the "Logging" icon. Verify the "Format:" under "Log File" is configured to "W3C". Select the "Fields" button. Under "Custom Fields", click the "Add Field..." button. For each field being added, give a name unique to what the field is capturing. Click on the "Source Type" drop-down list and select "Request Header". Click on the "Source" drop-down list and select "Connection". Click "OK" to add. Click on the "Source Type" drop-down list and select "Request Header". Click on the "Source" drop-down list and select "Warning". Click "OK" to add. Click "Apply" under the "Actions" pane.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- IIST-SV-000111
- Vuln IDs
-
- V-218789
- V-100113
- Rule IDs
-
- SV-218789r561041_rule
- SV-109217
Checks: C-20261r505276_chk
Access the IIS 10.0 web server IIS Manager. Click the IIS 10.0 web server name. Under "IIS", double-click the "Logging" icon. Verify the "Format:" under "Log File" is configured to "W3C". Select the "Fields" button. Under "Standard Fields", verify "User Agent", "User Name", and "Referrer" are selected. Under "Custom Fields", verify the following field has been configured: Request Header >> Authorization Response Header >> Content-Type If any of the above fields are not selected, this is a finding.
Fix: F-20259r505277_fix
Access the IIS 10.0 web server IIS Manager. Click the IIS 10.0 web server name. Under "IIS", double-click the "Logging" icon. Verify the "Format:" under "Log File" is configured to "W3C". Select the "Fields" button. Under "Standard Fields", select "User Agent", "User Name", and "Referrer". Under "Custom Fields", select the following fields: Click on the "Source Type" drop-down list and select "Request Header". Click on the "Source" drop-down list and select "Authorization". Click "OK" to add. Click on the "Source" drop-down list and select "Content-Type". Click on the "Source Type" drop-down list and select "Response Header". Click "OK" to add. Click "OK". Click "Apply" under the "Actions" pane.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- IIST-SV-000115
- Vuln IDs
-
- V-218790
- V-100115
- Rule IDs
-
- SV-218790r561041_rule
- SV-109219
Checks: C-20262r570471_chk
This check does not apply to service account IDs utilized by automated services necessary to process, manage, and store log files. Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Click the "Logging" icon. Click "Browse" and navigate to the directory where the log files are stored. Right-click the log file directory to review. Click "Properties". Click the "Security" tab. Verify log file access is restricted as follows. Otherwise, this is a finding. SYSTEM - Full Control Administrators - Full Control
Fix: F-20260r570472_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Click the "Logging" icon. Click "Browse" and navigate to the directory where the log files are stored. Right-click the log file directory to review and click "Properties". Click the "Security" tab. Set the log file permissions for the appropriate group(s). Click "OK". Select "Apply" in the "Actions" pane.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- IIST-SV-000116
- Vuln IDs
-
- V-218791
- V-100117
- Rule IDs
-
- SV-218791r561041_rule
- SV-109221
Checks: C-20263r310848_chk
The IIS 10.0 web server and website log files should be backed up by the system backup. To determine if log files are backed up by the system backup, determine the location of the web server log files and each website's log files. Open the IIS 10.0 Manager. Click the IIS 10.0 server name. Click the "Logging" icon. Under "Log File" >> "Directory" obtain the path of the log file. Once all locations are known, consult with the System Administrator to review the server's backup procedure and policy. Verify the paths of all log files are part of the system backup. Verify log files are backed up to an unrelated system or onto separate media on which the system the web server is running. If the paths of all log files are not part of the system backup and/or not backed up to a separate media, this is a finding.
Fix: F-20261r310849_fix
Configure system backups to include the directory paths of all IIS 10.0 web server and website log files.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000117
- Vuln IDs
-
- V-218792
- V-100119
- Rule IDs
-
- SV-218792r561041_rule
- SV-109223
Checks: C-20264r310851_chk
Interview the System Administrator about the role of the IIS 10.0 web server. If the IIS 10.0 web server is hosting an application, have the SA provide supporting documentation on how the application's user management is accomplished outside of the IIS 10.0 web server. If the IIS 10.0 web server is not hosting an application, this is Not Applicable. If the IIS web server is performing user management for hosted applications, this is a finding. If the IIS 10.0 web server is hosting an application and the SA cannot provide supporting documentation on how the application's user management is accomplished outside of the IIS 10.0 web server, this is a finding.
Fix: F-20262r310852_fix
Reconfigure any hosted applications on the IIS 10.0 web server to perform user management outside the IIS 10.0 web server. Document how the hosted application user management is accomplished.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000118
- Vuln IDs
-
- V-218793
- V-100121
- Rule IDs
-
- SV-218793r561041_rule
- SV-109225
Checks: C-20265r310854_chk
Click “Start”. Open Control Panel. Click “Programs”. Click “Programs and Features”. Review the installed programs. If any programs are installed other than those required for the IIS 10.0 web services, this is a finding. Note: If additional software is needed, supporting documentation must be signed by the ISSO.
Fix: F-20263r310855_fix
Remove all unapproved programs and roles from the production IIS 10.0 web server.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000119
- Vuln IDs
-
- V-218794
- V-100123
- Rule IDs
-
- SV-218794r561041_rule
- SV-109227
Checks: C-20266r310857_chk
Open the IIS 10.0 Manager. Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server. If, under the IIS installed features, "Application Request Routing Cache" is not present, this is not a finding. If, under the IIS installed features, "Application Request Routing Cache" is present, double-click the icon to open the feature. From the right "Actions" pane, under "Proxy", select "Server Proxy Settings...". In the "Application Request Routing" settings window, verify whether "Enable proxy" is selected. If “Enable proxy" is selected under the "Application Request Routing" settings, this is a finding.
Fix: F-20264r310858_fix
Open the IIS 10.0 Manager. Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server. Under the IIS installed features, "Application Request Routing Cache" is present, double-click the icon to open the feature. From the right "Actions" pane, under "Proxy", select "Server Proxy Settings...". In the "Application Request Routing" settings window, remove the check from the "Enable proxy" check box. Click "Apply" in the "Actions" pane.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- IIST-SV-000120
- Vuln IDs
-
- V-218795
- V-100125
- Rule IDs
-
- SV-218795r561041_rule
- SV-109229
Checks: C-20267r310860_chk
Navigate to the following folders: inetpub\ Program Files\Common Files\System\msadc Program Files (x86)\Common Files\System\msadc If the folder or sub-folders contain any executable sample code, example applications, or tutorials which are not explicitly used by a production website, this is a finding.
Fix: F-20265r310861_fix
Remove any executable sample code, example applications, or tutorials which are not explicitly used by a production website.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000121
- Vuln IDs
-
- V-218796
- V-100127
- Rule IDs
-
- SV-218796r561041_rule
- SV-109231
Checks: C-20268r310863_chk
Access the IIS 10.0 web server. Access “Apps” menu. Under “Administrative Tools”, select “Computer Management”. In the left pane, expand "Local Users and Groups" and click "Users". Review the local users listed in the middle pane. If any local accounts are present and were created by features which have been uninstalled or are not used, this is a finding.
Fix: F-20266r310864_fix
Access the IIS 10.0 web server. Access “Apps” menu. Under “Administrative Tools”, select “Computer Management”. In the left pane, expand "Local Users and Groups" and click "Users". Delete any local accounts which were created by features which have been uninstalled or are not used.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000123
- Vuln IDs
-
- V-218797
- V-100129
- Rule IDs
-
- SV-218797r561041_rule
- SV-109233
Checks: C-20269r310866_chk
Consult with the System Administrator and review all of the IIS 10.0 and Operating System features installed. Determine if any features installed are no longer necessary for operation. If any utility programs, features, or modules are installed which are not necessary for operation, this is a finding. If any unnecessary Operating System features are installed, this is a finding.
Fix: F-20267r310867_fix
Remove all utility programs, Operating System features, or modules installed that are not necessary for web server operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000124
- Vuln IDs
-
- V-218798
- V-100131
- Rule IDs
-
- SV-218798r561041_rule
- SV-109235
Checks: C-20270r310869_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under IIS, double-click the "MIME Types" icon. From the "Group by:" drop-down list, select "Content Type". From the list of extensions under "Application", verify MIME types for OS shell program extensions have been removed, to include at a minimum, the following extensions: .exe .dll .com .bat .csh If any OS shell MIME types are configured, this is a finding.
Fix: F-20268r310870_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under IIS, double-click the "MIME Types" icon. From the "Group by:" drop-down list, select "Content Type". From the list of extensions under "Application", remove MIME types for OS shell program extensions, to include at a minimum, the following extensions: .exe .dll .com .bat .csh Under the "Actions" pane, click "Apply".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000125
- Vuln IDs
-
- V-218799
- V-100133
- Rule IDs
-
- SV-218799r561041_rule
- SV-109237
Checks: C-20271r310872_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Review the features listed under the “IIS" section. If the "WebDAV Authoring Rules" icon exists, this is a finding.
Fix: F-20269r310873_fix
Access Server Manager on the IIS 10.0 web server. Click the IIS 10.0 web server name. Click on "Manage". Select "Add Roles and Features". Click "Next" in the "Before you begin" dialog box. Select "Role-based or feature-based installation" on the "Installation Type" dialog box and click "Next". Select the IIS 10.0 web server in the "Server Selection" dialog box. From the "Windows Features" dialog box, navigate to "World Wide Web Services" >> "Common HTTP Features". De-select "WebDAV Publishing", and click "Next" to complete removing the WebDAV Publishing feature from the IIS 10.0 web server.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- IIST-SV-000129
- Vuln IDs
-
- V-218800
- V-100135
- Rule IDs
-
- SV-218800r561041_rule
- SV-109239
Checks: C-20272r310875_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Server Certificate" icon. Double-click each certificate and verify the certificate path is to a DoD root CA. If the “Issued By” field of the PKI certificate being used by the IIS 10.0 server/site does not indicate the issuing Certificate Authority (CA) is part of the DoD PKI or an approved ECA, this is a finding.
Fix: F-20270r310876_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Server Certificate" icon. Import a valid DoD certificate and remove any non-DoD certificates.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- IIST-SV-000130
- Vuln IDs
-
- V-218801
- V-100137
- Rule IDs
-
- SV-218801r561041_rule
- SV-109241
Checks: C-20273r310878_chk
Search the system for files with either .java or .jpp extensions. If files with .java or .jpp extensions are found, this is a finding.
Fix: F-20271r310879_fix
Remove all files from the web server with both .java and .jpp extensions.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- IIST-SV-000131
- Vuln IDs
-
- V-218802
- V-100139
- Rule IDs
-
- SV-218802r561041_rule
- SV-109243
Checks: C-20274r310881_chk
Obtain a list of the user accounts with access to the system, including all local and domain accounts. Review the privileges to the web server for each account. Verify with the system administrator or the ISSO that all privileged accounts are mission essential and documented. Verify with the system administrator or the ISSO that all non-administrator access to shell scripts and operating system functions are mission essential and documented. If undocumented privileged accounts are found, this is a finding. If undocumented non-administrator access to shell scripts and operating system functions are found, this is a finding. If this IIS 10 installation is supporting Microsoft Exchange, and not otherwise hosting any content, this requirement is Not Applicable.
Fix: F-20272r310882_fix
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities. All non-administrator access to shell scripts and operating system functions must be mission essential and documented.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- IIST-SV-000132
- Vuln IDs
-
- V-218803
- V-100141
- Rule IDs
-
- SV-218803r561041_rule
- SV-109245
Checks: C-20275r570474_chk
Review the IIS 10.0 web server configuration with the System Administrator. Determine if the IIS 10.0 web server hosts any applications. If the IIS 10.0 web server does not host any applications, this is Not Applicable. If the IIS 10.0 web server is hosting Exchange, this is Not Applicable. If the IIS 10.0 web server hosts applications, review the application's management functionality and authentication methods with the System Administrator to determine if the management of the application is accomplished with the same functions and authentication methods as the web server management. If the IIS 10.0 web server management and the application's management functionality is not separated, this is a finding.
Fix: F-20273r310885_fix
Develop a method to manage the hosted applications, either by moving its management functions off of the IIS 10.0 web server or by accessing the application's management via a uniquely assigned IP address.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- IIST-SV-000134
- Vuln IDs
-
- V-218804
- V-100143
- Rule IDs
-
- SV-218804r561041_rule
- SV-109247
Checks: C-20276r310887_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under "ASP.Net", double-click the "Session State" icon. Under "Cookie Settings", verify the "Mode" has "Use Cookies" selected from the drop-down list. If the "Cookie Settings" "Mode" is not set to "Use Cookies", this is a finding. Alternative method: Click the site name. Select "Configuration Editor" under the "Management" section. From the "Section:" drop-down list at the top of the configuration editor, locate "system.web/sessionState". Verify the "cookieless" is set to "UseCookies". If the "cookieless" is not set to "UseCookies", this is a finding. Note: If IIS 10.0 server/site is used only for system-to-system maintenance, does not allow users to connect to interface, and is restricted to specific system IPs, this is Not Applicable.
Fix: F-20274r310888_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under "ASP.Net", double-click the "Session State" icon. Under "Cookie Settings", select "Use Cookies” from the "Mode" drop-down list. Click "Apply" in the "Actions" pane.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- IIST-SV-000135
- Vuln IDs
-
- V-218805
- V-100145
- Rule IDs
-
- SV-218805r561041_rule
- SV-109249
Checks: C-20277r310890_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under the "ASP.NET" section, select "Session State". Under "Cookie Settings", verify the "Use Cookies" mode is selected from the "Mode:" drop-down list. Under Time-out (in minutes), verify “20 minutes or less” is selected. If the "Use Cookies” mode is selected and Time-out (in minutes) is configured for “20 minutes or less”, this is not a finding. Alternative method: Click the site name. Select "Configuration Editor" under the "Management" section. From the "Section:" drop-down list at the top of the configuration editor, locate "system.web/sessionState". Verify the "cookieless" is set to "UseCookies". If the "cookieless" is not set to "UseCookies", this is a finding. Note: If IIS 10.0 server/site is used only for system-to-system maintenance, does not allow users to connect to interface, and is restricted to specific system IPs, this is Not Applicable.
Fix: F-20275r310891_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under the "ASP.NET" section, select "Session State". Under "Cookie Settings", select the "Use Cookies" mode from the "Mode:" drop-down list. Under “Time-out (in minutes), enter a value of “20 or less”.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- IIST-SV-000136
- Vuln IDs
-
- V-218806
- V-100147
- Rule IDs
-
- SV-218806r561041_rule
- SV-109251
Checks: C-20278r310893_chk
Interview the System Administrator for the IIS 10.0 web server. Ask for documentation on the disaster recovery methods tested and planned for the IIS 10.0 web server in the event of the necessity for rollback. If documentation for a disaster recovery has not been established, this is a finding.
Fix: F-20276r310894_fix
Prepare documentation for disaster recovery methods for the IIS 10.0 web server in the event of the necessity for rollback. Document and test the disaster recovery methods designed.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- IIST-SV-000137
- Vuln IDs
-
- V-218807
- V-100149
- Rule IDs
-
- SV-218807r561041_rule
- SV-109253
Checks: C-20279r310896_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Machine Key" icon in the website Home Pane. Verify "HMACSHA256" or stronger encryption is selected for the Validation method and "Auto" is selected for the Encryption method. If "HMACSHA256" or stronger encryption is not selected for the Validation method and/or "Auto" is not selected for the Encryption method, this is a finding. If .NET is not installed, this is Not Applicable.
Fix: F-20277r310897_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Machine Key" icon in the web server Home Pane. Set the Validation method to "HMACSHA256" or stronger. Set the Encryption method to "Auto". Click "Apply" in the "Actions" pane.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- IIST-SV-000138
- Vuln IDs
-
- V-218808
- V-100151
- Rule IDs
-
- SV-218808r561041_rule
- SV-109255
Checks: C-20280r310899_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Directory Browsing" icon. Under the “Actions” pane verify "Directory Browsing" is disabled. If “Directory Browsing” is not disabled, this is a finding.
Fix: F-20278r310900_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Directory Browsing" icon. Under the "Actions" pane click "Disabled". Under the "Actions" pane, click "Apply".
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- IIST-SV-000139
- Vuln IDs
-
- V-218809
- V-100153
- Rule IDs
-
- SV-218809r561041_rule
- SV-109257
Checks: C-20281r310902_chk
Access the IIS 10.0 Web Server. Access an administrator command prompt and type "regedit <enter>" to access the server's registry. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex\Catalogs\. If this key exists, then indexing is enabled. If the key does not exist, this check is Not Applicable. Review the Catalog keys to determine if directories other than web document directories are being indexed. If so, this is a finding.
Fix: F-20279r310903_fix
Run MMC. Add the Indexing Service snap-in. Edit the indexed directories to only include web document directories.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- IIST-SV-000140
- Vuln IDs
-
- V-218810
- V-100155
- Rule IDs
-
- SV-218810r561041_rule
- SV-109259
Checks: C-20282r310905_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Error Pages" icon. Click any error message, and then click "Edit Feature Setting" from the "Actions" Pane. This will apply to all error messages. If the feature setting is not set to “Detailed errors for local requests and custom error pages for remote requests”, this is a finding.
Fix: F-20280r310906_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Error Pages" icon. Click any error message, and then click "Edit Feature Setting" from the "Actions" Pane. This will apply to all error messages. Set Feature Setting to “Detailed errors for local requests and custom error pages for remote requests”.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-002314
- Version
- IIST-SV-000141
- Vuln IDs
-
- V-218811
- V-100157
- Rule IDs
-
- SV-218811r561041_rule
- SV-109261
Checks: C-20283r505279_chk
If web administration is performed at the console, this check is NA. If web administration is performed remotely, the following checks will apply: If administration of the server is performed remotely, it will only be performed securely by system administrators. If website administration or web application administration has been delegated, those users will be documented and approved by the ISSO. Remote administration must be in compliance with any requirements contained within the Windows Server STIGs and any applicable Network STIGs. Remote administration of any kind will be restricted to documented and authorized personnel. All users performing remote administration must be authenticated. All remote sessions will be encrypted and utilize FIPS 140-2-approved protocols. FIPS 140-2-approved TLS versions include TLS V1.2 or greater. Review with site management how remote administration is configured on the website, if applicable. If remote management meets the criteria listed above, this is not a finding. If remote management is utilized and does not meet the criteria listed above, this is a finding.
Fix: F-20281r505280_fix
Ensure the web server administration is only performed over a secure path.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- IIST-SV-000142
- Vuln IDs
-
- V-218812
- V-100159
- Rule IDs
-
- SV-218812r561041_rule
- SV-109263
Checks: C-20284r310911_chk
Note: This requirement applies to the Web Management Service. If the Web Management Service is not installed, this is Not Applicable. Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under "Management", double-click "Management Service". If "Enable remote connections" is not selected, this is Not Applicable. If "Enable remote connections" is selected, review the entries under "IP Address Restrictions". Verify only known, secure IP ranges are configured as "Allow". If "IP Address Restrictions" are not configured or IP ranges configured to "Allow" are not restrictive enough to prevent connections from nonsecure zones, this is a finding.
Fix: F-20282r310912_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under "Management", double-click "Management Service". Stop the Web Management Service under the "Actions" pane. Configure only known, secure IP ranges as "Allow". Select "Apply" in "Actions" pane. Restart the Web Management Service under the "Actions" pane.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- IIST-SV-000143
- Vuln IDs
-
- V-218813
- V-100161
- Rule IDs
-
- SV-218813r561041_rule
- SV-109265
Checks: C-20285r310914_chk
Interview the System Administrator and Web Manager. Ask for documentation for the IIS 10.0 web server administration. Verify there are documented procedures for shutting down an IIS 10.0 website in the event of an attack. The procedure should, at a minimum, provide the following steps: Determine the respective website for the application at risk of an attack. Access the IIS 10.0 web server IIS Manager. Select the respective website. In the "Actions" pane, under "Manage Website", click "Stop". If necessary, stop all websites. If necessary, stop the IIS 10.0 web server by selecting the web server in the IIS Manager. In the "Actions" pane, under "Manage Server", click "Stop". If the web server is not capable or cannot be configured to disconnect or disable remote access to the hosted applications when necessary, this is a finding.
Fix: F-20283r310915_fix
Prepare documented procedures for shutting down an IIS 10.0 website in the event of an attack. The procedure should, at a minimum, provide the following steps: Determine the respective website for the application at risk of an attack. Access the IIS 10.0 web server IIS Manager. Select the respective website. In the "Actions" pane, under "Manage Website", click "Stop". If necessary, stop all websites. If necessary, stop the IIS 10.0 web server by selecting the web server in the IIS Manager. In the "Actions" pane, under "Manage Server", click "Stop".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- IIST-SV-000144
- Vuln IDs
-
- V-218814
- V-100163
- Rule IDs
-
- SV-218814r561041_rule
- SV-109267
Checks: C-20286r310917_chk
Open Explorer and navigate to the inetpub directory. Right-click "inetpub" and select "Properties". Click the "Security" tab. Verify the permissions for the following users; if the permissions are less restrictive, this is a finding. System: Full control Administrators: Full control TrustedInstaller: Full control ALL APPLICATION PACKAGES (built-in security group): Read and execute ALL RESTRICTED APPLICATION PACKAGES (built-in security group): Read and execute Users: Read and execute, list folder contents CREATOR OWNER: Full Control, Subfolders and files only
Fix: F-20284r310918_fix
Open Explorer and navigate to the inetpub directory. Right-click "inetpub" and select "Properties". Click the "Security" tab. Set the following permissions: SYSTEM: Full control Administrators: Full control TrustedInstaller: Full control ALL APPLICATION PACKAGES (built-in security group): Read and execute Users: Read and execute, list folder contents CREATOR OWNER: special permissions to subkeys
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- IIST-SV-000145
- Vuln IDs
-
- V-218815
- V-100165
- Rule IDs
-
- SV-218815r561041_rule
- SV-109269
Checks: C-20287r310920_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under "IIS" double-click the "Logging" icon. In the "Logging" configuration box, determine the "Directory:" to which the "W3C" logging is being written. Confirm with the System Administrator that the designated log path is of sufficient size to maintain the logging. Under "Log File Rollover", verify "Do not create new log files" is not selected. Verify a schedule is configured to rollover log files on a regular basis. Consult with the System Administrator to determine if there is a documented process for moving the log files off of the IIS 10.0 web server to another logging device. If the designated logging path device is not of sufficient space to maintain all log files, and there is not a schedule to rollover files on a regular basis, this is a finding.
Fix: F-20285r310921_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under "IIS" double-click on the "Logging" icon. If necessary, in the "Logging" configuration box, re-designate a log path to a location able to house the logs. Under "Log File Rollover", de-select the "Do not create new log files" setting. Configure a schedule to rollover log files on a regular basis.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- IIST-SV-000147
- Vuln IDs
-
- V-218816
- V-100167
- Rule IDs
-
- SV-218816r561041_rule
- SV-109271
Checks: C-20288r310923_chk
Right-click "InetMgr.exe", then click "Properties" from the "Context" menu. Select the "Security" tab. Review the groups and user names. The following accounts may have Full control privileges: TrustedInstaller Web Managers Web Manager designees CREATOR OWNER: Full Control, Subfolders and files only The following accounts may have read and execute, or read permissions: Non Web Manager Administrators ALL APPLICATION PACKAGES (built-in security group) ALL RESTRICTED APPLICATION PACKAGES (built-in security group) SYSTEM Users Specific users may be granted read and execute and read permissions. Compare the local documentation authorizing specific users, against the users observed when reviewing the groups and users. If any other access is observed, this is a finding.
Fix: F-20286r310924_fix
Restrict access to the web administration tool to only the web manager and the web manager’s designees.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- IIST-SV-000148
- Vuln IDs
-
- V-218817
- V-100169
- Rule IDs
-
- SV-218817r561041_rule
- SV-109273
Checks: C-20289r310926_chk
Review programs installed on the OS. Open Control Panel. Open Programs and Features. The following programs may be installed without any additional documentation: Administration Pack for IIS IIS Search Engine Optimization Toolkit Microsoft .NET Framework version 3.5 SP1 or greater Microsoft Web Platform Installer version 3.x or greater Virtual Machine Additions Review the installed programs, if any programs are installed other than those listed above, this is a finding. Note: If additional software is needed and has supporting documentation signed by the ISSO, this is not a finding.
Fix: F-20287r310927_fix
Remove all unapproved programs and roles from the production web server.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- IIST-SV-000149
- Vuln IDs
-
- V-218818
- V-100171
- Rule IDs
-
- SV-218818r561041_rule
- SV-109275
Checks: C-20290r310929_chk
If the Print Services role and the Internet Printing role are not installed, this check is Not Applicable. Navigate to the following directory: %windir%\web\printers If this folder exists, this is a finding. Determine whether Internet Printing is enabled: Click “Start”, click “Administrative Tools”, and then click “Server Manager”. Expand the roles node, right-click “Print Services”, and then select “Remove Roles Services”. If the Internet Printing option is enabled, this is a finding.
Fix: F-20288r310930_fix
Click “Start”, click “Administrative Tools”, and then click “Server Manager”. Expand the roles node, right-click “Print Services”, and then select “Remove Roles Services”. If the Internet Printing option is checked, clear the check box, click “Next”, and then click “Remove” to complete the wizard.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- IIST-SV-000151
- Vuln IDs
-
- V-218819
- V-100173
- Rule IDs
-
- SV-218819r561041_rule
- SV-109277
Checks: C-20291r310932_chk
If the IIS 10.0 web server is not hosting any applications, this is Not Applicable. If the IIS 10.0 web server is hosting applications, consult with the System Administrator to determine risk analysis performed when the application was written and deployed to the IIS 10.0 web server. Obtain documentation on the configuration. Verify, at a minimum, the following tuning settings in the registry. Access the IIS 10.0 web server registry. Verify the following keys are present and configured. The required setting depends upon the requirements of the application. Recommended settings are not provided as these settings must be explicitly configured to show a conscientious tuning has been made. Navigate to HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\ "URIEnableCache" "UriMaxUriBytes" "UriScavengerPeriod" If explicit settings are not configured for "URIEnableCache", "UriMaxUriBytes" and "UriScavengerPeriod", this is a finding.
Fix: F-20289r310933_fix
Access the IIS 10.0 web server registry. Verify the following keys are present and configured. The required setting depends upon the requirements of the application. These settings must be explicitly configured to show a conscientious tuning has been made. Navigate to HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\ Configure the following registry keys to levels to accommodate the hosted applications. "URIEnableCache" "UriMaxUriBytes" "UriScavengerPeriod"
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- IIST-SV-000152
- Vuln IDs
-
- V-218820
- V-100175
- Rule IDs
-
- SV-218820r561041_rule
- SV-109279
Checks: C-20292r310935_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under the "Management" section, double-click the "Configuration Editor" icon. From the "Section:" drop-down list, select "system.webServer/asp". Expand the "session" section. Verify the "keepSessionIdSecure" is set to "True". If the "keepSessionIdSecure" is not set to "True", this is a finding.
Fix: F-20290r310936_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Under "Management" section, double-click the "Configuration Editor" icon. From the "Section:" drop-down list, select "system.webServer/asp". Expand the "session" section. Select "True" for the "keepSessionIdSecure" setting. Select "Apply" from the "Actions" pane.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- IIST-SV-000153
- Vuln IDs
-
- V-218821
- V-100177
- Rule IDs
-
- SV-218821r561041_rule
- SV-109281
Checks: C-20293r505282_chk
Access the IIS 10.0 Web Server. Access an administrator command prompt and type "regedit <enter>" to access the server's registry. Navigate to: HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server Verify a REG_DWORD value of "0" for "DisabledByDefault" Navigate to: HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server Verify a REG_DWORD value of "1" for "DisabledByDefault" Verify a REG_DWORD value of "0" for "Enabled" If any of the respective registry paths do not exist or are configured with the wrong value, this is a finding.
Fix: F-20291r505283_fix
Access the IIS 10.0 Web Server. Access an administrator command prompt and type "regedit <enter>" to access the server's registry. Navigate to the following registry paths and configure the "DisabledByDefault" REG_DWORD with the appropriate values: HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server With a REG_DWORD value of "0" for "DisabledByDefault" HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server With a REG_DWORD value of "1" for "DisabledByDefault" With a REG_DWORD value of "0" for "Enabled"
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- IIST-SV-000154
- Vuln IDs
-
- V-218822
- V-100179
- Rule IDs
-
- SV-218822r561041_rule
- SV-109283
Checks: C-20294r310941_chk
Review the web server documentation and deployed configuration to determine which version of TLS is being used. If the TLS version is not TLS 1.2 or higher, according to NIST SP 800-52, or if non-FIPS-approved algorithms are enabled, this is a finding.
Fix: F-20292r310942_fix
Configure the web server to use an approved TLS version according to NIST SP 800-52 and to disable all non-approved versions.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- IIST-SV-000156
- Vuln IDs
-
- V-218823
- V-100181
- Rule IDs
-
- SV-218823r561041_rule
- SV-109285
Checks: C-20295r310944_chk
Access the IIS 10.0 web server. Access the "Apps" menu. Under "Administrative Tools", select "Computer Management". In left pane, expand "Local Users and Groups" and click "Users". Review the local users listed in the middle pane. If any local accounts are present and used by IIS 10.0, verify with System Administrator that default passwords have been changed. If passwords have not been changed from the default, this is a finding.
Fix: F-20293r310945_fix
Access the IIS 10.0 web server. Access the "Apps" menu. Under Administrative Tools, select Computer Management. In left pane, expand "Local Users and Groups" and click on "Users". Change passwords for any local accounts present that are used by IIS 10.0, then verify with System Administrator default passwords have been changed. Develop an internal process for changing passwords on a regular basis.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IIST-SV-000158
- Vuln IDs
-
- V-218824
- V-100183
- Rule IDs
-
- SV-218824r561041_rule
- SV-109287
Checks: C-20296r310947_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "ISAPI and CGI restrictions" icon. Click “Edit Feature Settings". Verify the "Allow unspecified CGI modules" and the "Allow unspecified ISAPI modules" check boxes are NOT checked. If either or both of the "Allow unspecified CGI modules" and the "Allow unspecified ISAPI modules" check boxes are checked, this is a finding.
Fix: F-20294r310948_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "ISAPI and CGI restrictions" icon. Click "Edit Feature Settings". Remove the check from the "Allow unspecified CGI modules" and the "Allow unspecified ISAPI modules" check boxes. Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IIST-SV-000159
- Vuln IDs
-
- V-218825
- V-100185
- Rule IDs
-
- SV-218825r695274_rule
- SV-109289
Checks: C-20297r695272_chk
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the ".NET Authorization Rules" icon. If any groups other than "Administrators" is listed, this is a finding. If ASP.NET is not installed, this is Not Applicable.
Fix: F-20295r695273_fix
Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "Authorization Rules" icon. Remove all groups other than "Administrators".
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- IIST-SV-000200
- Vuln IDs
-
- V-218826
- V-100187
- Rule IDs
-
- SV-218826r561041_rule
- SV-109291
Checks: C-20298r310953_chk
Access the IIS 10.0 IIS Manager. Click the IIS 10.0 server. Select "Configuration Editor" under the "Management" section. From the "Section:" drop-down list at the top of the configuration editor, locate "system.applicationHost/sites". Expand "siteDefaults". Expand "limits". Review the results and verify the value is greater than zero for the "maxconnections" parameter. If the maxconnections parameter is set to zero, this is a finding.
Fix: F-20296r310954_fix
Access the IIS 10.0 IIS Manager. Click the IIS 10.0 server. Select "Configuration Editor" under the "Management" section. From the "Section:" drop-down list at the top of the configuration editor, locate "system.applicationHost/sites". Expand "siteDefaults". Expand "limits". Set the "maxconnections" parameter to a value greater than zero.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- IIST-SV-000205
- Vuln IDs
-
- V-218827
- V-100189
- Rule IDs
-
- SV-218827r695271_rule
- SV-109293
Checks: C-20299r695269_chk
Access the IIS 10.0 Web Server. Open IIS Manager. Click the IIS 10.0 web server name. Click on HSTS. Verify “Enable” is checked, and Max-Age is set to something other than “0”. Verify “IncludeSubDomains” and “Redirect HTTP to HTTPS” are checked. Click "OK". If HSTS has not been enabled, this is a finding. If the website is behind a load balancer or proxy server, and HSTS enablement is handled there, this is Not Applicable. The recommended max age is 8 minutes (480 seconds) or greater. Any value greater than 0 is not a finding. If the version of Windows Server does not natively support HSTS, this is not a finding.
Fix: F-20297r695270_fix
Enable HSTS via IIS Manager or Powershell.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- IIST-SV-000160
- Vuln IDs
-
- V-228572
- V-102895
- Rule IDs
-
- SV-228572r561041_rule
- SV-111857
Checks: C-30804r505288_chk
Interview the System Administrator about the role of the IIS 10.0 web server. If the IIS 10.0 web server is running SMTP relay services, have the SA provide supporting documentation on how the server is hardened. A DoD-issued certificate, and specific allowed IP address should be configured. If the IIS web server is not running SMTP relay services, this is Not Applicable. If the IIS web server running SMTP relay services without TLS enabled, this is a finding. If the IIS web server running SMTP relay services is not configured to only allow a specific IP address, from the same network as the relay, this is a finding.
Fix: F-30783r505289_fix
Configure the relay server with a specific allowed IP address, from the same network as the relay, and implement TLS.
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- IIST-SV-000210
- Vuln IDs
-
- V-241788
- V-41854
- Rule IDs
-
- SV-241788r695281_rule
- SV-54431
Checks: C-45064r695279_chk
Open Registry Editor. Navigate to “HKLM\CurrentControlSet\Services\HTTP\Parameters” Verify “DisableServerHeader” is set to “1”. If REG_DWORD DisableServerHeader is not set to 1, this is a finding. If the System Administrator can show that Server Version information has been removed via other means, such as using a rewrite outbound rule, this is not a finding.
Fix: F-45023r695280_fix
Navigate to “HKLM\CurrentControlSet\Services\HTTP\Parameters” Create REG_DWORD “DisableServerHeader” and set it to “1” Note: This can be performed multiple ways, this is an example.
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- IIST-SV-000215
- Vuln IDs
-
- V-241789
- V-41854
- Rule IDs
-
- SV-241789r695284_rule
- SV-54431
Checks: C-45065r695282_chk
Open the IIS 10.0 Manager. Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server. Click the HTTP Response Headers button. Click to select the “X-Powered-By” HTTP Header. If “X-Powered-By” has not been removed, this is a finding.
Fix: F-45024r695283_fix
Open the IIS 10.0 Manager. Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server. Click the HTTP Response Headers button. Click to select the “X-Powered-By” HTTP Header. Click “Remove” in the Actions Panel. Note: This can be performed multiple ways, this is an example.