Internet Information System (IIS) or its subcomponents must not be installed on a workstation.

STIG ID: WN10-00-000100  |  SRG: SRG-OS-000095-GPOS-00049 |  Severity: high |  CCI: CCI-000381 |  Vulnerability Id: V-220718 | 

Vulnerability Discussion

Installation of Internet Information System (IIS) may allow unauthorized internet services to be hosted. Websites must only be hosted on servers that have been designed for that purpose and can be adequately secured.

Check

IIS is not installed by default. Verify it has not been installed on the system.

Run "Programs and Features".
Select "Turn Windows features on or off".

If the entries for "Internet Information Services" or "Internet Information Services Hostable Web Core" are selected, this is a finding.

If an application requires IIS or a subset to be installed to function, this needs be documented with the ISSO. In addition, any applicable requirements from the IIS STIG must be addressed.

Fix

Uninstall "Internet Information Services" or "Internet Information Services Hostable Web Core" from the system.