Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-6262 | DTBI046 | SV-40580r1_rule | ECSC-1 | Medium |
Description |
---|
Users could submit credentials to servers operated by malicious people who could then attempt to connect to legitimate servers with those captured credentials. Care must be taken with user credentials, automatic logon performance, and how default Windows credentials are passed to web sites. |
STIG | Date |
---|---|
Internet Explorer 9 Security Technical Implementation Guide | 2014-03-21 |
Check Text ( http://oval.mitre.org/XMLSchema/oval-definitions-5 ) |
---|
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Logon options" must be “Enabled” and "Prompt for user name and password" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1A00 is REG_DWORD = 65536 (decimal), this is not a finding. |
Fix Text (F-34446r1_fix) |
---|
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Logon options" to “Enabled” and select "Prompt for user name and password" from the drop-down box. |