IIST-SV-000215 - ASP.NET version must be removed from the HTTP Response Header information.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of certain HTTP Response Header information to remote requesters exposes internal configuration information to potential attackers.

Solution

Open the IIS 10.0 Manager.
Under the 'Connections' pane on the left side of the management console, select the IIS 10.0 web server.
Click the HTTP Response Headers button.
Click to select the 'X-Powered-By' HTTP Header.
Click 'Remove' in the Actions Panel.
Note: This can be performed multiple ways, this is an example.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y22M01_STIG.zip

Item Details

References: CAT|III, CCI|CCI-001312, Rule-ID|SV-241789r695284_rule, STIG-ID|IIST-SV-000215, STIG-Legacy|SV-54431, STIG-Legacy|V-41854, Vuln-ID|V-241789

Plugin: Windows

Control ID: 7301a30fba5745316098c16b94f9fa471e4e6597e66bbe597deeda9aaca456c1