Skip to main content
CUI

STIG Rule - V-241788

V-241788

SV-241788r1025160_rule

Deprecated CAT III

This rule has been deprecated. Deprecated on 2026-03-12. It is no longer included in the current version of this STIG.

HTTPAPI Server version must be removed from the HTTP Response Header information.

From: Microsoft IIS 10.0 Server Security Technical Implementation Guide (V3R4)

Description

<VulnDiscussion>HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of certain HTTP Response Header information to remote requesters exposes internal configuration information to potential attackers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Note: If the server is hosting WSUS, this is Not Applicable. Open Registry Editor. Navigate to "HKLM\System\CurrentControlSet\Services\HTTP\Parameters" Verify "DisableServerHeader” is set to "2". If REG_DWORD DisableServerHeader is not set to 2, this is a finding. If the System Administrator can show that Server Version information has been removed via other means, such as using a rewrite outbound rule, this is not a finding.

Fix Text

Navigate to "HKLM\System\CurrentControlSet\Services\HTTP\Parameters". Create REG_DWORD "DisableServerHeader” and set it to "2". Note: This can be performed multiple ways; this is an example.

CCI Reference

CCI-001312
Created
2026-01-14 17:55:45
Last Updated
2026-01-14 17:55:45
CUI