ASP.NET version must be removed from the HTTP Response Header information.

STIG ID: IIST-SV-000215  |  SRG: SRG-APP-000266-WSR-000159 |  Severity: low |  CCI: CCI-001312 |  Vulnerability Id: V-241789 | 

Vulnerability Discussion

HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of certain HTTP Response Header information to remote requesters exposes internal configuration information to potential attackers.

Check

Note: If ASP.NET is not installed, this is Not Applicable.

Open the IIS 10.0 Manager.
Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server.
Click the HTTP Response Headers button.
Click to select the “X-Powered-By” HTTP Header.
If “X-Powered-By” has not been removed, this is a finding.

Fix

Open the IIS 10.0 Manager.
Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server.
Click the HTTP Response Headers button.
Click to select the “X-Powered-By” HTTP Header.
Click “Remove” in the Actions Panel.
Note: This can be performed multiple ways, this is an example.