V-254270
CAT IIWindows Server 2022 must not have the Microsoft FTP service installed unless required by the organization.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 1
Check Text
If the server has the role of an FTP server, this is NA.
Open "PowerShell".
Enter "Get-WindowsFeature | Where Name -eq Web-Ftp-Service".
If "Installed State" is "Installed", this is a finding.
An Installed State of "Available" or "Removed" is not a finding.
If the system has the role of an FTP server, this must be documented with the Information System Security Officer (ISSO).
Fix Text
Uninstall the "FTP Server" role.
Start "Server Manager".
Select the server with the role.
Scroll down to "ROLES AND FEATURES" in the right pane.
Select "Remove Roles and Features" from the drop-down "TASKS" list.
Select the appropriate server on the "Server Selection" page and click "Next".
Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page.
Click "Next" and "Remove" as prompted.
STIG Reference
- STIG
- Microsoft Windows Server 2022 Security Technical Implementation Guide
- Version
- 2
- Release
- 8
- Rule ID
- SV-254270r958480_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| LAB BASELINES | BASELINE | SCHR-P3-DP-001_WinServer2022_V2R7_20260305-133436.cklb | Unassigned | 2026-03-05T13:34:36 | View in Context |