IIST-SV-000210 - HTTPAPI Server version must be removed from the HTTP Response Header information.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of certain HTTP Response Header information to remote requesters exposes internal configuration information to potential attackers.

Solution

Navigate to 'HKLM\System\CurrentControlSet\Services\HTTP\Parameters'.

Create REG_DWORD 'DisableServerHeader' and set it to '1'.

Note: This can be performed multiple ways, this is an example.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y22M01_STIG.zip

Item Details

References: CAT|III, CCI|CCI-001312, Rule-ID|SV-241788r766901_rule, STIG-ID|IIST-SV-000210, STIG-Legacy|SV-54431, STIG-Legacy|V-41854, Vuln-ID|V-241788

Plugin: Windows

Control ID: e49f54ed3bbdd3412c00438eb67f17f7a165b7cb7caa4e81acdfd13c998ed2f2