STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2016 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

Windows PowerShell 2.0 must not be installed.

DISA Rule

SV-224859r569186_rule

Vulnerability Number

V-224859

Group Title

SRG-OS-000095-GPOS-00049

Rule Version

WN16-00-000420

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Uninstall the "Windows PowerShell 2.0 Engine".

Start "Server Manager".

Select the server with the feature.

Scroll down to "ROLES AND FEATURES" in the right pane.

Select "Remove Roles and Features" from the drop-down "TASKS" list.

Select the appropriate server on the "Server Selection" page and click "Next".

Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page.

Click "Next" and "Remove" as prompted.

Check Contents

Open "PowerShell".

Enter "Get-WindowsFeature | Where Name -eq PowerShell-v2".

If "Installed State" is "Installed", this is a finding.

An Installed State of "Available" or "Removed" is not a finding.

Vulnerability Number

V-224859

Documentable

False

Rule Version

WN16-00-000420

Severity Override Guidance

Open "PowerShell".

Enter "Get-WindowsFeature | Where Name -eq PowerShell-v2".

If "Installed State" is "Installed", this is a finding.

An Installed State of "Available" or "Removed" is not a finding.

Check Content Reference

M

Target Key

4205

Comments