STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2019 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

Windows Server 2019 FTP servers must be configured to prevent access to the system drive.

DISA Rule

SV-205854r569188_rule

Vulnerability Number

V-205854

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN19-00-000430

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the FTP sites to allow access only to specific FTP shared resources. Do not allow access to other areas of the system.

Check Contents

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select "Sites" under the server name.

For any sites with a Binding that lists FTP, right-click the site and select "Explore".

If the site is not defined to a specific folder for shared FTP resources, this is a finding.

If the site includes any system areas such as root of the drive, Program Files, or Windows directories, this is a finding.

Vulnerability Number

V-205854

Documentable

False

Rule Version

WN19-00-000430

Severity Override Guidance

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select "Sites" under the server name.

For any sites with a Binding that lists FTP, right-click the site and select "Explore".

If the site is not defined to a specific folder for shared FTP resources, this is a finding.

If the site includes any system areas such as root of the drive, Program Files, or Windows directories, this is a finding.

Check Content Reference

M

Target Key

2907

Comments