Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-254278 | WN22-00-000410 | SV-254278r848650_rule | Medium |
Description |
---|
Windows PowerShell 5.x added advanced logging features that can provide additional detail when malware has been run on a system. Disabling the Windows PowerShell 2.0 mitigates against a downgrade attack that evades the Windows PowerShell 5.x script block logging feature. |
STIG | Date |
---|---|
Microsoft Windows Server 2022 Security Technical Implementation Guide | 2022-08-25 |
Check Text ( C-57763r848648_chk ) |
---|
Open "PowerShell". Enter "Get-WindowsFeature | Where Name -eq PowerShell-v2". If "Installed State" is "Installed", this is a finding. An Installed State of "Available" or "Removed" is not a finding. |
Fix Text (F-57714r848649_fix) |
---|
Uninstall the "Windows PowerShell 2.0 Engine". Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page. Click "Next" and "Remove" as prompted. |