UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IIS 7.0 Server STIG


Overview

Date Finding Count (135)
2019-03-22 CAT I (High): 14 CAT II (Med): 104 CAT III (Low): 17
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Public)

Finding ID Severity Title
V-13699 High The IIS web site permissions "Write" or "Script Source" must not be selected.
V-13698 High The IISADMPWD directory has not been removed from the Web server.
V-13591 High Classified web servers will be afforded physical security commensurate with the classification of its content.
V-2258 High The web client account access to the content and scripts directories will be limited to read and execute.
V-13686 High Remote authors or content providers will only use secure encrypted logons and connections to upload files to the Document Root directory.
V-2249 High Web server administration will be performed over a secure path or at the console.
V-2247 High Only administrators are allowed access to the directory tree, the shell, or other operating system functions and utilities.
V-2246 High The web server must use a vendor-supported version of the web server software.
V-13733 High The ”IncludesNOEXEC” directive is not enabled on any directory that maintains Server Side Includes.
V-6537 High Anonymous access accounts are restricted.
V-2267 High Unused and vulnerable script mappings in IIS are not removed or set to the 404.dll.
V-13621 High All web server documentation, sample code, example applications, and tutorials will be removed from a production web server.
V-13701 High The command shell options are not disabled.
V-13713 High A unique non-privileged account must be used to run Worker Process Identities.
V-13694 Medium Public web servers will use TLS if authentication is required.
V-6755 Medium Directory Browsing is not disabled.
V-6754 Medium The IIS Internet Printing Protocol is not disabled.
V-26279 Medium Error logging must be enabled.
V-2259 Medium Web server system files will conform to minimum file permission requirements.
V-2256 Medium The access control files are owned by a privileged web server account.
V-2254 Medium Only web sites that have been fully reviewed and tested will exist on a production web server.
V-2255 Medium The web server’s htpasswd files (if present) will reflect proper ownership and permissions
V-2252 Medium Users other than from the Auditors group have greater than read access to log files.
V-2250 Medium Logs of web server access and errors will be established and maintained
V-13687 Medium Remote authors or content providers must have all files scanned for malware before uploading files to the Document Root directory.
V-13723 Medium The MaxRequestEntityAllowed metabase value must be defined.
V-13722 Medium The UrlSegmentMaxCount registry entry must be set properly.
V-13721 Medium The UriMaxUriBytes registry entry must be set properly.
V-13720 Medium The PercentUAllowed registry entry must be set properly.
V-13688 Medium Log file data must contain required data elements.
V-13689 Medium Access to the web server log files will be restricted to administrators, web administrators, and auditors.
V-13725 Medium The httpd.conf KeepAlive directive is not enabled.
V-13724 Medium The httpd.conf Timeout directive is not set properly.
V-2248 Medium Access to web administration tools is restricted to the web manager and the web manager’s designees.
V-13619 Medium The web server, although started by superuser or privileged account, is not run using a non- privileged account.
V-13613 Medium The site software used with the web server does not have all applicable security patches applied and documented.
V-2240 Medium The number of allowed simultaneous requests will be limited for web sites.
V-2243 Medium A private web server will be located on a separate controlled access subnet.
V-2242 Medium A public web server will be physically and logically isolated in accordance with the DoD Internet-NIPRNet DMZ STIG and the DoD Enclave STIG.
V-13738 Medium The httpd.conf LimitRequestFieldsize directive is set to unlimited.
V-13739 Medium The httpd.conf LimitRequestline directive is set to unlimited.
V-13730 Medium The httpd.conf MaxClients directive is not set properly.
V-13731 Medium The CGI-Bin directory or the directory that maintains CGI scripts is not the only directory to have the ExecCGI directive applied. .
V-13732 Medium The” –FollowSymLinks” directive is not used on all data directories.
V-13734 Medium The MultiViews directive is used.
V-13735 Medium The” -Indexes” directive is not used on all data directories not containing a default index page unless the mod_autoindex module is disabled.
V-13736 Medium The httpd.conf LimitRequestBody directive is set to unlimited.
V-13737 Medium The httpd.conf LimitRequestFields directive is set to unlimited.
V-13710 Medium An application pool’s pinging monitor must be enabled.
V-26294 Medium Web server status module must be disabled.
V-2270 Medium Anonymous FTP user access to interactive scripts is prohibited.
V-2271 Medium Monitoring software will include CGI or equivalent programs in the set of files which it checks.
V-2272 Medium PERL scripts must use the TAINT option.
V-91207 Medium Public web server resources must not be shared with private assets.
V-26299 Medium The web server must not be configured as a proxy server.
V-6531 Medium A web server that utilizes PKI as an authentication mechanism must utilize subscriber certificates issued from a DoD-authorized Certificate Authority.
V-26043 Medium The production web-site must configure the Maximum Query String limit.
V-2264 Medium Wscript.exe and Cscript.exe are accessible by users other than the SA and the web administrator.
V-2263 Medium A private web server will have a valid DoD server certificate.
V-2262 Medium A private web server will utilize TLS v 1.0 or greater.
V-2261 Medium A public web server will limit e-mail to outbound only.
V-2268 Medium The IUSR_machinename account has read access to the .inc files or their equivalent.
V-26285 Medium Active software modules must be minimized.
V-26287 Medium Web Distributed Authoring and Versioning (WebDAV) must be disabled.
V-26280 Medium The sites error logs must log the correct format.
V-26281 Medium System logging must be enabled.
V-26282 Medium The LogLevel directive must be enabled.
V-26323 Medium The web server must be configured to explicitly deny access to the OS root.
V-26322 Medium The ScoreBoard file must be properly secured.
V-60709 Medium The web server must remove all export ciphers from the cipher suite.
V-26327 Medium The URL-path name must be set to the file path name or the directory path name.
V-26326 Medium The web server must be configured to listen on a specific IP address and port.
V-26325 Medium The TRACE method must be disabled.
V-26324 Medium Web server options for the OS root must be disabled.
V-13620 Medium A private web server’s list of CAs in a trust hierarchy will lead to the DoD PKI Root CA, to a DoD-approved external certificate authority (ECA), or to a DoD-approved external partner.
V-13705 Medium The maximum number of requests an application pool can process must be set.
V-13704 Medium The Recycle Worker processes in minutes monitor must be set properly.
V-13707 Medium The maximum used memory monitor must be enabled.
V-13706 Medium The maximum virtual memory monitor must be enabled.
V-13700 Medium The File System Object component, is not required and is not disabled.
V-13703 Medium The website must have a unique application pool.
V-13709 Medium The maximum queue length for HTTP.sys must be managed.
V-13708 Medium The Idle Timeout monitor must be enabled.
V-26042 Medium The production web-site must limit the MaxURL.
V-26034 Medium The production web-site must configure the Global .NET Trust Level.
V-3333 Medium The web document (home) directory will be in a separate partition from the web server’s system files.
V-3330 Medium URLScan is not being used on the web server
V-26041 Medium The web-site must limit the number of bytes accepted in a request.
V-26046 Medium The production web-site must filter unlisted file extensions in URL requests.
V-26305 Medium The process ID (PID) file must be properly secured.
V-26044 Medium The web-site must not allow non-ASCII characters in URLs.
V-26302 Medium User specific directories must not be globally enabled.
V-26045 Medium The web-site must not allow double encoded URL requests.
V-13712 Medium An application pool’s rapid fail protection settings must be managed.
V-26026 Medium The production website must utilize SHA1 encryption for Machine Key.
V-13711 Medium An application pool’s rapid fail protection must be enabled.
V-13716 Medium The FavorUTF8 registry key must be set properly.
V-13717 Medium The MaxFieldLength registry entry must be set properly.
V-13714 Medium The AllowRestrictedChars registry key must be disabled.
V-13715 Medium The EnableNonUTF8 registry key must be disabled.
V-13718 Medium The MaxRequestBytes registry entry must be set properly.
V-13719 Medium The UrlSegmentMaxLength registry entry must be set properly.
V-13728 Medium The httpd.conf MinSpareServers directive is not set properly.
V-26393 Medium The ability to override the access configuration for the OS root directory must be disabled.
V-26396 Medium HTTP request methods must be limited.
V-2234 Medium A public web server’s resources (e.g., drives, folders, printers, etc.) will not be shared with private assets.
V-2235 Medium The service account ID used to run the web site will have its password changed at least annually.
V-2236 Medium Installation of compilers on production web server is prohibited.
V-2232 Medium The web server service password(s) must be entrusted to the SA or Web Manager.
V-6577 Medium A web server will be segregated from other services.
V-13727 Medium The httpd.conf StartServers directive is not set properly.
V-13726 Medium The httpd.conf KeepAliveTimeout directive is set to unlimited.
V-2229 Medium Interactive scripts used on a web server will have proper access controls.
V-2228 Medium The CGI script directory has improper access controls.
V-2226 Medium Web content directories anonymously shared via a network share.
V-13672 Medium The private web server will use an approved DoD certificate validation process.
V-25999 Medium Unspecified file extensions must not be allowed to execute on the production web server.
V-26368 Medium Automatic directory indexing must be disabled.
V-15334 Low Web sites will utilize ports, protocols, and services according to PPSM guidelines.
V-2257 Low Administrative users and groups that have access rights to the web server are documented.
V-2251 Low All utility programs, not necessary for operations, will be removed or disabled.
V-6724 Low Web server and/or operating system information will be protected.
V-2245 Low Each readable web document directory will contain either default, home, index, or equivalent file.
V-3963 Low Content Index Service indexes directories, other than web document directories.
V-2265 Low Java software installed on the production web server will be limited to class files and the JAVA virtual machine.
V-2260 Low A private web server will not respond to requests from public search engines.
V-13702 Low The Content Location header contains proprietary IP addresses.
V-26031 Low The production web-site must be configured to prevent detailed HTTP error pages from being sent to remote clients.
V-13729 Low The httpd.conf MaxSpareServers directive is not set properly.
V-6485 Low Web server content and configuration files are not part of a routine backup program in order to recover from file damage and system failure.
V-2230 Low Backup interactive scripts on the production web server are prohibited.
V-26011 Low Debug must be turned off on a production website.
V-6373 Low The required DoD banner page will be displayed to authenticated users accessing a DoD private web site.
V-26006 Low A global authorization rule to restrict access must exist on the web server.
V-25994 Low Directory Browsing must be disabled on the production web server.