UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Windows Server 2022 must not have the Microsoft FTP service installed unless required by the organization.


Overview

Finding ID Version Rule ID IA Controls Severity
V-254270 WN22-00-000330 SV-254270r848626_rule Medium
Description
Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption.
STIG Date
Microsoft Windows Server 2022 Security Technical Implementation Guide 2023-09-11

Details

Check Text ( C-57755r848624_chk )
If the server has the role of an FTP server, this is NA.

Open "PowerShell".

Enter "Get-WindowsFeature | Where Name -eq Web-Ftp-Service".

If "Installed State" is "Installed", this is a finding.

An Installed State of "Available" or "Removed" is not a finding.

If the system has the role of an FTP server, this must be documented with the Information System Security Officer (ISSO).
Fix Text (F-57706r848625_fix)
Uninstall the "FTP Server" role.

Start "Server Manager".

Select the server with the role.

Scroll down to "ROLES AND FEATURES" in the right pane.

Select "Remove Roles and Features" from the drop-down "TASKS" list.

Select the appropriate server on the "Server Selection" page and click "Next".

Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page.

Click "Next" and "Remove" as prompted.