STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Microsoft Windows Server 2019 Security Technical Implementation Guide

V-205854

CAT II (Medium)

Windows Server 2019 FTP servers must be configured to prevent access to the system drive.

Rule ID

SV-205854r991589_rule

STIG

Microsoft Windows Server 2019 Security Technical Implementation Guide

Version

V3R8

CCIs

CCI-000366

Discussion

The FTP service allows remote users to access shared files and directories that could provide access to system resources and compromise the system, especially if the user can gain access to the root directory of the boot drive.

Check Content

If FTP is not installed on the system, this is NA.

Open "Internet Information Services (IIS) Manager".

Select "Sites" under the server name.

For any sites with a Binding that lists FTP, right-click the site and select "Explore".

If the site is not defined to a specific folder for shared FTP resources, this is a finding.

If the site includes any system areas such as root of the drive, Program Files, or Windows directories, this is a finding.

Fix Text

Configure the FTP sites to allow access only to specific FTP shared resources. Do not allow access to other areas of the system.