STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2019 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

Windows Server 2019 must not have Windows PowerShell 2.0 installed.

DISA Rule

SV-205685r569188_rule

Vulnerability Number

V-205685

Group Title

SRG-OS-000095-GPOS-00049

Rule Version

WN19-00-000410

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Uninstall the "Windows PowerShell 2.0 Engine".

Start "Server Manager".

Select the server with the feature.

Scroll down to "ROLES AND FEATURES" in the right pane.

Select "Remove Roles and Features" from the drop-down "TASKS" list.

Select the appropriate server on the "Server Selection" page and click "Next".

Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page.

Click "Next" and "Remove" as prompted.

Check Contents

Open "PowerShell".

Enter "Get-WindowsFeature | Where Name -eq PowerShell-v2".

If "Installed State" is "Installed", this is a finding.

An Installed State of "Available" or "Removed" is not a finding.

Vulnerability Number

V-205685

Documentable

False

Rule Version

WN19-00-000410

Severity Override Guidance

Open "PowerShell".

Enter "Get-WindowsFeature | Where Name -eq PowerShell-v2".

If "Installed State" is "Installed", this is a finding.

An Installed State of "Available" or "Removed" is not a finding.

Check Content Reference

M

Target Key

2907

Comments