UCF STIG Viewer Logo

ASP.NET version must be removed from the HTTP Response Header information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-241789 IIST-SV-000215 SV-241789r695284_rule Low
Description
HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of certain HTTP Response Header information to remote requesters exposes internal configuration information to potential attackers.
STIG Date
Microsoft IIS 10.0 Server Security Technical Implementation Guide 2022-06-17

Details

Check Text ( C-45065r695282_chk )
Open the IIS 10.0 Manager.

Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server.

Click the HTTP Response Headers button.

Click to select the “X-Powered-By” HTTP Header.

If “X-Powered-By” has not been removed, this is a finding.
Fix Text (F-45024r695283_fix)
Open the IIS 10.0 Manager.
Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server.
Click the HTTP Response Headers button.
Click to select the “X-Powered-By” HTTP Header.
Click “Remove” in the Actions Panel.
Note: This can be performed multiple ways, this is an example.