V-259384
CAT IIAutomatic Update of Trust Anchors must be enabled on key rollover.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 0
Check Text
Note: This check is not applicable for Windows DNS Servers that host only Active Directory-integrated zones or for Windows DNS Servers on a classified network.
Log on to the DNS server using the Domain Admin or Enterprise Admin account or Local Administrator account.
If not automatically started, initialize the Server Manager window by clicking its icon from the bottom left corner of the screen.
Once the Server Manager window is initialized, from the left pane, click to select the DNS category.
From the right pane, under the "SERVERS" section, right-click the DNS server.
From the context menu that appears, click "DNS Manager".
On the opened DNS Manager snap-in from the left pane, expand the server name and then expand "Forward Lookup Zones".
From the expanded list, click to select and then right-click the zone name.
From the displayed context menu, click DNSSEC >> Properties.
Click the "KSK" tab.
For each KSK that is listed under Key signing keys (KSKs), click the KSK, click "Edit", and in the "Key Rollover" section, verify the "Enable automatic rollover" check box is selected.
If the "Enable automatic rollover" check box is not selected for every KSK listed, this is a finding.
Fix Text
Log on to the DNS server using the Domain Admin or Enterprise Admin account or Local Administrator account.
If not automatically started, initialize the Server Manager window by clicking its icon from the bottom left corner of the screen.
Once the Server Manager window is initialized, from the left pane, click to select the DNS category.
From the right pane, under the "SERVERS" section, right-click the DNS server.
From the context menu that appears, click "DNS Manager".
On the opened DNS Manager snap-in from the left pane, expand the server name and then expand "Forward Lookup Zones".
From the expanded list, click to select and then right-click the zone name.
From the displayed context menu, click DNSSEC >> Properties.
Click the "KSK" tab.
For each KSK that is listed under key signing keys (KSKs), click the KSK, click "Edit", and in the "Key Rollover" section, select the "Enable automatic rollover" check box.
STIG Reference
- STIG
- Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
- Version
- 2
- Release
- 4
- Rule ID
- SV-259384r961107_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_WinServerDNS_V2R3_20251023-172313.ckl | Unassigned | 2026-01-14T12:57:38.179760 | View in Context |