WN16-00-000430 - FTP servers must be configured to prevent anonymous logons.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The FTP service allows remote users to access shared files and directories. Allowing anonymous FTP connections makes user auditing difficult.

Using accounts that have administrator privileges to log on to FTP risks that the userid and password will be captured on the network and give administrator access to an unauthorized user.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the FTP service to prevent anonymous logons.

Open 'Internet Information Services (IIS) Manager'.

Select the server.

Double-click 'FTP Authentication'.

Select 'Anonymous Authentication'.

Select 'Disabled' under 'Actions'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2016_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-224860r569186_rule, STIG-ID|WN16-00-000430, STIG-Legacy|SV-87955, STIG-Legacy|V-73303, Vuln-ID|V-224860

Plugin: Windows

Control ID: fcdacefa62693af0ccfd37bfe233798d17b9bf0105b01bc4d672613d417a5bcf