Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-6311 | DTBI136 | SV-40619r1_rule | ECSC-1 | Medium |
Description |
---|
Users could submit credentials to servers operated by malicious people who could then attempt to connect to legitimate servers with those captured credentials. Care must be taken with user credentials, automatic logon performance, and how default Windows credentials are passed to web sites. |
STIG | Date |
---|---|
Internet Explorer 9 Security Technical Implementation Guide | 2015-06-30 |
Check Text ( C-39362r1_chk ) |
---|
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Logon options" must be “Enabled” and "Anonymous logon" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1A00 is REG_DWORD = 196608 (decimal), this is not a finding. |
Fix Text (F-34473r1_fix) |
---|
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Logon options" to “Enabled” and select "Anonymous logon" from the drop-down box. |