STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2016 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

FTP servers must be configured to prevent anonymous logons.

DISA Rule

SV-224860r569186_rule

Vulnerability Number

V-224860

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN16-00-000430

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the FTP service to prevent anonymous logons.

Open "Internet Information Services (IIS) Manager".

Select the server.

Double-click "FTP Authentication".

Select "Anonymous Authentication".

Select "Disabled" under "Actions".

Check Contents

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select the server.

Double-click "FTP Authentication".

If the "Anonymous Authentication" status is "Enabled", this is a finding.

Vulnerability Number

V-224860

Documentable

False

Rule Version

WN16-00-000430

Severity Override Guidance

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select the server.

Double-click "FTP Authentication".

If the "Anonymous Authentication" status is "Enabled", this is a finding.

Check Content Reference

M

Target Key

4205

Comments