STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2019 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

Windows Server 2019 FTP servers must be configured to prevent anonymous logons.

DISA Rule

SV-205853r569188_rule

Vulnerability Number

V-205853

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN19-00-000420

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the FTP service to prevent anonymous logons.

Open "Internet Information Services (IIS) Manager".

Select the server.

Double-click "FTP Authentication".

Select "Anonymous Authentication".

Select "Disabled" under "Actions".

Check Contents

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select the server.

Double-click "FTP Authentication".

If the "Anonymous Authentication" status is "Enabled", this is a finding.

Vulnerability Number

V-205853

Documentable

False

Rule Version

WN19-00-000420

Severity Override Guidance

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select the server.

Double-click "FTP Authentication".

If the "Anonymous Authentication" status is "Enabled", this is a finding.

Check Content Reference

M

Target Key

2907

Comments