STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2016 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

FTP servers must be configured to prevent access to the system drive.

DISA Rule

SV-224861r569186_rule

Vulnerability Number

V-224861

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN16-00-000440

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the FTP sites to allow access only to specific FTP shared resources. Do not allow access to other areas of the system.

Check Contents

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select "Sites" under the server name.

For any sites with a Binding that lists FTP, right-click the site and select "Explore".

If the site is not defined to a specific folder for shared FTP resources, this is a finding.

If the site includes any system areas such as root of the drive, Program Files, or Windows directories, this is a finding.

Vulnerability Number

V-224861

Documentable

False

Rule Version

WN16-00-000440

Severity Override Guidance

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select "Sites" under the server name.

For any sites with a Binding that lists FTP, right-click the site and select "Explore".

If the site is not defined to a specific folder for shared FTP resources, this is a finding.

If the site includes any system areas such as root of the drive, Program Files, or Windows directories, this is a finding.

Check Content Reference

M

Target Key

4205

Comments