IISW-SV-000140 - Warning and error messages displayed to clients must be modified to minimize the identity of the IIS 8.5 web server, patches, loaded modules, and directory paths.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

HTTP error pages contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of HTTP error pages with full information to remote requesters exposes internal configuration information to potential attackers.

Solution

Open the IIS 8.5 Manager.

Click the IIS 8.5 web server name.

Double-click the 'Error Pages' icon.

Click on any error message and click 'Edit Feature Setting' from the 'Actions' Pane. This will apply to all error messages.

Set Feature Setting to 'Detailed errors for local requests and custom error pages for remote requests'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_8-5_Y20M10_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-11, CAT|II, CCI|CCI-001312, Rule-ID|SV-214425r508658_rule, STIG-ID|IISW-SV-000140, STIG-Legacy|SV-91433, STIG-Legacy|V-76737, Vuln-ID|V-214425

Plugin: Windows

Control ID: f83087881102f9afe969cf31149eafbd4a5071a275a15dc181d40141e1a37527