IISW-SV-000158 - Unspecified file extensions on a production IIS 8.5 web server must be removed

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

By allowing unspecified file extensions to execute, the web servers attack surface is significantly increased. This increased risk can be reduced by only allowing specific ISAPI extensions or CGI extensions to run on the web server.

Solution

Open the IIS 8.5 Manager.

Click the IIS 8.5 web server name.

Double-click the 'ISAPI and CGI restrictions' icon.

Click 'Edit Feature Settings'.

Remove the check from the 'Allow unspecified CGI modules' and the 'Allow unspecified ISAPI modules' check boxes.

Click OK.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_8-5_Y23M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-214440r879887_rule, STIG-ID|IISW-SV-000158, STIG-Legacy|SV-91465, STIG-Legacy|V-76769, Vuln-ID|V-214440

Plugin: Windows

Control ID: bae1b09ca964816e2e4c0ac271b926c854d5a3447bace7453381f6ad43dd82ae