This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Hardening IIS"

From OWASP
Jump to: navigation, search
(Directory Browsing)
Line 13: Line 13:
 
1) Alter the web.config to set the directoryBrowse feature to false
 
1) Alter the web.config to set the directoryBrowse feature to false
  
<configuration>
+
  <configuration>
  <system.webServer>
+
      <system.webServer>
      <directoryBrowse enabled="false" />
+
        <directoryBrowse enabled="false" />
  </system.webServer>
+
      </system.webServer>
</configuration>
+
  </configuration>
  
 
2) or Navigate to IIS in the Server Manager, and uncheck Directory Browsing under Common HTTP Features.
 
2) or Navigate to IIS in the Server Manager, and uncheck Directory Browsing under Common HTTP Features.

Revision as of 22:11, 16 August 2018

Draft - Work In Progress

Basic configuration

Common changes that should be part of all IIS installations.

Disable directoryBrowsing

Directory browsing gives the user the ability to just navigate to http://server/directory/ and get a list of all files in the directory. This was useful when web servers were primarily file servers, but is clearly a security problem now.

To disable directory browsing in IIS 10.0 (and several earlier versions, either:

1) Alter the web.config to set the directoryBrowse feature to false

  <configuration>
     <system.webServer>
        <directoryBrowse enabled="false" />
     </system.webServer>
  </configuration>

2) or Navigate to IIS in the Server Manager, and uncheck Directory Browsing under Common HTTP Features.

Avoid wildcard host headers

Ensure applicationPoolIdentity is configured for all application pools

Use an unique applicationPool per site

Disable IIS detailed error page from displaying remotely

Request filtering

Configure maxAllowedContentLength

Configure maxURL request filter

Configure MaxQueryString request filter

Reject non-ASCII characters in URLs

Reject double-encoded requests

Disable HTTP trace requests

Disallow unlisted file extensions

Enable Dynamic IP Address Restrictions

Transport Encryption

SSL/TLS settings are controlled at the SChannel level. They are set machine wide and IIS respects these values.

A list of recommendations for IIS

Disable SSL v2/v3

Disable TLS 1.0

Disable TLS 1.1

Ensure TLS 1.2 is enabled

Disable weak cipher suites (NULL cipher suites, DES cipher suites, RC4 cipher suites, Triple DES, etc)

Ensure TLS cipher suites are correctly ordered

https://cloudblogs.microsoft.com/microsoftsecure/2017/09/07/new-iis-functionality-to-help-identify-weak-tls-usage/

HSTS support

IIS recently (Windows Server 1709) added turnkey support for HSTS

https://docs.microsoft.com/en-us/iis/get-started/whats-new-in-iis-10-version-1709/iis-10-version-1709-hsts

CORS support

If you choose not to handle CORS in your application, we ship an IIS an IIS module to help configure CORS

https://blogs.iis.net/iisteam/getting-started-with-the-iis-cors-module

Authors

Sourabh Shirhatti (Microsoft)

Bill Sempf ([email protected])