UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

HTTPAPI Server version must be removed from the HTTP Response Header information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-241788 IIST-SV-000210 SV-241788r961167_rule Low
Description
HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of certain HTTP Response Header information to remote requesters exposes internal configuration information to potential attackers.
STIG Date
Microsoft IIS 10.0 Server Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-45064r766899_chk )
Open Registry Editor.

Navigate to “HKLM\System\CurrentControlSet\Services\HTTP\Parameters”

Verify “DisableServerHeader” is set to “1”.

If REG_DWORD DisableServerHeader is not set to 1, this is a finding.

If the System Administrator can show that Server Version information has been removed via other means, such as using a rewrite outbound rule, this is not a finding.
Fix Text (F-45023r766900_fix)
Navigate to “HKLM\System\CurrentControlSet\Services\HTTP\Parameters”.

Create REG_DWORD “DisableServerHeader” and set it to “1”.

Note: This can be performed multiple ways, this is an example.