3.12 Ensure Server Header is removed - Applications

Information

The server header headers specify the underlying technology used by the application.

Rationale:

While this is not the only way to fingerprint a site through the response headers, it makes it harder and prevents some potential attackers. The server header removal directive is a new feature in IIS 10 that can assist in mitigating this risk.

Impact:

This will remove the server header.

Solution

Enter the following command to use AppCmd.exe to configure:

%systemroot%\system32\inetsrv\appcmd.exe set config -section:system.webServer/security/requestFiltering /removeServerHeader:'True' /commit:apphost

OR

Enter the following command in PowerShell to configure:

Set-WebConfigurationProperty -pspath 'MACHINE/WEBROOT/APPHOST/' -filter 'system.webServer/security/requestFiltering' -name 'removeServerHeader' -value 'True'

Default Value:

Microsoft-IIS/10.0

See Also

https://workbench.cisecurity.org/files/4131