STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Microsoft IIS 10.0 Server Security Technical Implementation Guide

V-218825

CAT II (Medium)

The IIS 10.0 web server must have a global authorization rule configured to restrict access.

Rule ID

SV-218825r1067593_rule

STIG

Microsoft IIS 10.0 Server Security Technical Implementation Guide

Version

V3R7

CCIs

CCI-000366

Discussion

Authorization rules can be configured at the server, website, folder (including Virtual Directories), or file level. It is recommended that URL Authorization be configured to only grant access to the necessary security principals. Configuring a global Authorization rule that restricts access ensures inheritance of the settings down through the hierarchy of web directories. This will ensure access to current and future content is only granted to the appropriate principals, mitigating risk of unauthorized access.

Check Content

Note: If ASP.NET is not installed, this is Not Applicable.
Note: If the Server is hosting Microsoft SharePoint, this is Not Applicable.
Note: If the server is hosting WSUS, this is Not Applicable.
Note: If the server is hosting Exchange, this is Not Applicable.
Note: If the server is public facing, this is Not Applicable.
Note: If the website is behind a load balancer or proxy server, this is Not Applicable.

Open the IIS 10.0 Manager.
Click the IIS 10.0 web server name.
Double-click the ".NET Authorization Rules" icon.
Ensure "All Users" is set to "Allow", and "Anonymous Users" is set to "Deny", otherwise this is a finding.
If any other rules are present, this is a finding.

Fix Text

Open the IIS 10.0 Manager.

Click the IIS 10.0 web server name.

Double-click the ".NET Authorization Rules" icon.

Alter the list as necessary to ensure "All Users" is set to "Allow" and "Anonymous Users" is set to "Deny".

Remove any other line items.