UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The directory server supporting (directly or indirectly) system access or resource authorization, must run on a machine dedicated to that function.


Overview

Finding ID Version Rule ID IA Controls Severity
V-8326 DS00.1180_2008_R2 SV-39002r1_rule DCSP-1 Medium
Description
Executing application servers on the same host machine with a directory server may substantially weaken the security of the directory server. Web or database server applications usually require the addition of many programs and accounts increasing the attack surface of the computer. Some applications require the addition of privileged accounts providing potential sources of compromise. Some applications (such as MS Exchange) may require the use of network ports or services conflicting with the directory server. In thiscase, non-standard ports might be selected and this could interfere with intrusion detection or prevention services.
STIG Date
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide 2012-09-05

Details

Check Text ( C-37996r1_chk )
1. Display the programs running on the directory server by starting the Services console (Start, Run, "services.msc").

2. Determine if any running programs are application components. Check if any application-related services have the “Started” status.

Examples of some services indicating the presence of applications are:
- DHCP Server for DHCP server
- IIS Admin Service for IIS web server
- Microsoft Exchange System Attendant for Exchange
- MSSQLServer for SQL Server.

3. If any application-related components have the “Started” status, then this is a finding.

Supplemental Notes:

Any Domain Name System (DNS) server integrated with the directory server (e.g., AD-integrated DNS) is an acceptable application. However, the DNS server must comply with the DNS STIG security requirements.

Some directory servers utilize specialized web servers for administrative functions and databases for data management. These web and database servers are permitted as long as they are dedicated to directory server support and only administrative users have access to them.
Fix Text (F-33233r1_fix)
Remove the web, database, e-mail, or other application from the domain controller.