WN19-00-000330 - Windows Server 2019 must not have the Microsoft FTP service installed unless required by the organization.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unnecessary services increase the attack surface of a system. Some of these services may not support required levels of authentication or encryption.

Solution

Uninstall the 'FTP Server' role.

Start 'Server Manager'.

Select the server with the role.

Scroll down to 'ROLES AND FEATURES' in the right pane.

Select 'Remove Roles and Features' from the drop-down 'TASKS' list.

Select the appropriate server on the 'Server Selection' page and click 'Next'.

Deselect 'FTP Server' under 'Web Server (IIS)' on the 'Roles' page.

Click 'Next' and 'Remove' as prompted.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000382, Rule-ID|SV-205697r569188_rule, STIG-ID|WN19-00-000330, STIG-Legacy|SV-103507, STIG-Legacy|V-93421, Vuln-ID|V-205697

Plugin: Windows

Control ID: 9aa0f18c55e602427cbbc7ec8cd0f39b32986e09b4004509b188354710a0c9ae