Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-214441 | IISW-SV-000159 | SV-214441r802874_rule | Medium |
Description |
---|
Authorization rules can be configured at the server, website, folder (including Virtual Directories), or file level. It is recommended that URL Authorization be configured to only grant access to the necessary security principals. Configuring a global Authorization rule that restricts access ensures inheritance of the settings down through the hierarchy of web directories. This will ensure access to current and future content is only granted to the appropriate principals, mitigating risk of unauthorized access. |
STIG | Date |
---|---|
Microsoft IIS 8.5 Server Security Technical Implementation Guide | 2021-09-22 |
Check Text ( C-15651r802872_chk ) |
---|
If ASP.NET is not installed, this is Not Applicable. If the server is hosting SharePoint, this is Not Applicable. If the server is hosting WSUS, this is Not Applicable. If the server is hosting Exchange, this is Not Applicable. Open the IIS 8.5 Manager. Click the IIS 8.5 web server name. Double-click the “.NET Authorization Rules” icon. If any groups other than “Administrators” are listed, this is a finding. |
Fix Text (F-15649r802873_fix) |
---|
If ASP.NET is not installed, this is Not Applicable. If the server is hosting SharePoint, this is Not Applicable. If the server is hosting WSUS, this is Not Applicable. If the server is hosting Exchange, this is Not Applicable. Open the IIS 8.5 Manager. Click the IIS 8.5 web server name. Double-click the “Authorization Rules” icon. Remove all groups other than “Administrators”. |