Security Engineering December 10, 2025

Server Headers and Your Vulnerability Scans

Response headers are not the hero of a scan, but they can still land in a report. Here is how to trim version noise.

KM

Kyle Murray

Vanguard Cyber

Server headers and vulnerability scans

In most cases headers will not get you hacked if you patch, but they can still help an attacker fingerprint an old stack.

They are not the hero of a vulnerability scan, yet they can still make it into a penetration test report. Server headers and extra information returned from a web server appear in response headers.

In most cases they will not lead to your server being hacked, especially if you keep software updated. Yet in special cases they can give enough information to suggest an old, vulnerable version. If it is anything like recent web server bugs, you may be in for unwanted overtime.

Let's have a look at Windows IIS and an example of what is returned from the server and how to fix it.

Windows IIS

A quick web server shows Server: Microsoft-IIS/10.0 in responses.

Webserver showing Server header

IIS often also returns headers such as X-Powered-By and X-AspNet-Version. At the time of writing IIS 10.0 is secure, but tools like Shodan show how many hosts advertise the same version.

Shodan IIS 10.0

Older versions (e.g. 6.0) had long vulnerability lists. Many 6.0 hosts on Shodan are labelled honeypots.

Shodan IIS 6.0

To remove headers from responses, open IIS Manager and select the site.

IIS Manager home

Under the server name, expand Sites, open the site that exposes the header, then double-click Configuration Editor to access server variables.

IIS site selected IIS site settings

In the Section dropdown, choose appSettings.

appSettings in Configuration Editor

Find enableVersionHeader (often True). Set it to False to remove version headers.

enableVersionHeader True enableVersionHeader set to False enableVersionHeader updated

Click Apply (top right). You should see “The changes have been successfully saved.”

Apply success message

To remove the Server header, use the same Section menu: system.webServer > security > requestFiltering. Set removeServerHeader to True, then Apply again.

requestFiltering removeServerHeader True

Save the changes like before and now the IIS webserver doesn't respond with any unneeded server information.

Response without Server header

Talk to us about
your next assessment

Whether you are scoping a test, preparing for an audit, or building a roadmap, we keep the conversation clear, proportionate, and focused on what your teams and stakeholders need.