V-259374
CAT IIThe Windows DNS Server's IP address must be statically defined and configured locally on the server.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 1
Check Text
Log on to the DNS server using the Domain Admin or Enterprise Admin account or Local Administrator account.
Use "ipconfig /all" to identify all network adapters.
or
Locate the "Network Internet Access" icon, right-click on it, and select "Open Network & Sharing Center".
Click "Change adapter settings".
Right-click on the Ethernet and click "Properties".
Select "Internet Protocol Version 4 (TCP/IPv4)" and click "Properties".
Verify the "Use the following IP address" is selected, with an IP address, subnet mask, and default gateway assigned.
If the "Use the following IP address" is not selected with a configured IP address, subnet mask, and default gateway, this is a finding.
Fix Text
Log on to the DNS server using the Domain Admin or Enterprise Admin account or Local Administrator account.
Use "ipconfig /all" to identify all network adapters.
or
Locate the "Network Internet Access" icon, right-click on it, and select "Open Network & Sharing Center".
Click "Change adapter settings".
Right-click on the Ethernet and click "Properties".
Select "Internet Protocol Version 4 (TCP/IPv4)" and click "Properties".
Select "Use the following IP address" and populate with an IP address, subnet mask, and default gateway.
STIG Reference
- STIG
- Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
- Version
- 2
- Release
- 4
- Rule ID
- SV-259374r1156950_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_WinServerDNS_V2R3_20251023-172313.ckl | Unassigned | 2026-01-14T12:57:38.179760 | View in Context |