Skip to main content
CUI

Vulnerability V-228572

Back

V-228572

CAT II

An IIS Server configured to be a SMTP relay must require authentication.

Ships Affected
2
Total Findings
3
Open
1
Closed
0

Check Text

Interview the System Administrator about the role of the IIS 10.0 web server. If the IIS 10.0 web server is running SMTP relay services, have the SA provide supporting documentation on how the server is hardened. A DoD-issued certificate, and specific allowed IP address should be configured. If the IIS web server is not running SMTP relay services, this is Not Applicable. If the IIS web server running SMTP relay services without TLS enabled, this is a finding. If the IIS web server running SMTP relay services is not configured to only allow a specific IP address, from the same network as the relay, this is a finding.

Fix Text

Configure the relay server with a specific allowed IP address, from the same network as the relay, and implement TLS.

STIG Reference

STIG
Microsoft IIS 10.0 Server Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-228572r960963_rule

All Occurrences

This vulnerability appears on 2 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
LAB BASELINES BASELINE SCHR-P3-DP-001_IIS10Server_V3R6_20260305-132942.cklb
Unassigned 2026-03-12T15:38:14.420977 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DP-001/Checklist/MONT-DP-001_IIS10Server_V3R4_20251023-143809.ckl
Unassigned 2026-01-14T12:57:35.201603 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-MB-002/Checklist/MONT-MB-002_IIS10Server_V3R4_20251023-152431.ckl
Unassigned 2026-01-14T12:57:32.874734 View in Context
CUI