SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - maxConnections

Information

It is critical when a system is at risk of failing to process audit logs as required; actions are automatically taken to mitigate the failure or risk of failure.

One method used to thwart the auditing system is for an attacker to attempt to overwhelm the auditing system with large amounts of irrelevant data. The end result is audit logs that are either overwritten and activity thereby erased or disk space that is exhausted and any future activity is no longer logged.

In many system configurations, the disk space allocated to the auditing system is separate from the disks allocated for the operating system; therefore, this may not result in a system outage.

Solution

Configure SharePoint to reject or delay, as defined by the organization or site SSP, network traffic generated above configurable traffic volume thresholds.

Log on to the server.

Click Start.

Type Internet Information Services Manager in the Search Bar, click Enter.

Determine which IIS Sites are subject to user traffic. This is generally the IIS site hosting the Content Web Application.

For each site IIS site subject to user traffic, select the site.

Click Advanced Settings.

Expand Connection Limits.

Ensure the following settings possess a value:
-Connection Time-Out
-Maximum Bandwidth
-Maximum Concurrent Connections

Repeat steps for each site subject to user traffic.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_SharePoint_2013_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-223248r612235_rule, STIG-ID|SP13-00-000060, STIG-Legacy|SV-74385, STIG-Legacy|V-59955, Vuln-ID|V-223248

Plugin: Windows

Control ID: 439e409b935ce22d4f7c7f3d79f31487778e83effe7f9c362f17db46c517125e