{
"stig": {
"date": "2015-12-17",
"description": "None",
"findings": {
"V-14245": {
"checkid": "C-11590r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer \u201cDo Not Allow Users to enable or Disable Add-Ons\u201d will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Restrictions\n\nCriteria: If the value NoExtensionManagement \u201cdoes not\u201d exist or the value is set to REG_DWORD = 0, this is not a finding.\n\nIf the value NoExtensionManagement \u201cdoes\u201d exist and is set to REG_DWORD = 1 (decimal), this is a finding. ",
"description": "This check verifies that the system is configured to allow users to enable or disable add-ons through Add-On Manager in Internet Explorer.",
"fixid": "F-13570r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer \u201cDo Not Allow Users to enable or Disable Add-Ons\u201d will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Restrictions\n\nCriteria: Remove the value NoExtensionManagement or set to REG_DWORD = 0 (decimal). \n",
"iacontrols": [
"ECSC-1"
],
"id": "V-14245",
"ruleID": "SV-14856r1_rule",
"severity": "low",
"title": "Internet Explorer - Do not allow users to enable or disable add-ons.",
"version": "DTBI697"
},
"V-15490": {
"checkid": "C-14513r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable changing Automatic Configuration settings\" will be\nset to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: If the value Autoconfig is REG_DWORD = 1 (Hex), this is not a finding. \n",
"description": "This setting specifies to automatically detect the proxy server settings used to connect to the Internet and customize Internet Explorer. This setting specifies that Internet explorer use the configuration settings provided in a file by the system administrator. If you enable this policy setting, the user will not be able to do automatic configuration. You can import your current connection settings from your machine using Internet Explorer Maintenance under Admin Templates using group policy editor. If you disable or do no configure this policy setting, the user will have the freedom to automatically configure these settings.",
"fixid": "F-15121r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable changing Automatic Configuration settings\" will be\nset to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: Set the value Autoconfig to REG_DWORD = 1 (Hex).\n\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15490",
"ruleID": "SV-16337r1_rule",
"severity": "medium",
"title": "Automatic configuration of Internet Explorer is not disabled.",
"version": "DTBI305"
},
"V-15492": {
"checkid": "C-14515r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Prevent participation in the Customer Experience Improvement Program\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\SQM\n\nCriteria: If the value DisableCustomerImprovementProgram is REG_DWORD = 0, this is not a finding.\n",
"description": "This setting controls whether users can participate in the Microsoft Customer Experience Improvement Program to help improve Microsoft applications.\nWhen users choose to participate in the Customer Experience Improvement Program (CEIP), applications automatically send information to Microsoft about how the applications are used. This information is combined with other CEIP data to help Microsoft solve problems and to improve the products and features customers use most often. This feature does not collect users' names, addresses, or any other identifying information except the IP address that is used to send the data.\nBy default, users have the opportunity to opt into participation in the CEIP the first time they run an application. If your organization has policies that govern the use of external resources such as the CEIP, allowing users to opt in to the program might cause them to violate these policies.\n",
"fixid": "F-15123r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Prevent participation in the Customer Experience Improvement Program\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\SQM\n\nCriteria: Set the value DisableCustomerImprovementProgram to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15492",
"ruleID": "SV-16339r1_rule",
"severity": "medium",
"title": "Prevent participation in the Customer Experience Improvement Program is not disabled.",
"version": "DTBI315"
},
"V-15494": {
"checkid": "C-14517r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn off the Security Settings Check feature\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Security\n\nCriteria: If the value DisableSecuritySettingsCheck is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting turns off the Security Settings Check feature, which checks Internet Explorer security settings to determine when the settings put Internet Explorer at risk. If you enable this policy setting, the security settings check will not be performed. If you disable or do not configure this policy setting, the security settings check will be performed.",
"fixid": "F-15125r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn off the Security Settings Check feature\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Security\n\nCriteria: Set the value DisableSecuritySettingsCheck to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15494",
"ruleID": "SV-16341r1_rule",
"severity": "medium",
"title": "Turn off the Security Settings Check feature is not disabled. ",
"version": "DTBI325"
},
"V-15495": {
"checkid": "C-14518r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn off Managing Phishing filter\" will be set to \u201cEnabled\u201d and \"Off\" selected.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\PhishingFilter\n\nCriteria: If the value Enabled is REG_DWORD = 0, this is not a finding.\n\n",
"description": "This policy setting allows the user to enable a phishing filter that will warn if the Web site being visited is known for fraudulent attempts to gather personal information through \"phishing.\" If you enable this policy setting, the user will not be prompted to enable the phishing filter. You must specify which mode the phishing filter uses: manual, automatic, or off. If you select manual mode, the phishing filter performs only local analysis and users are prompted to permit any data to be sent to Microsoft. If the feature is fully enabled, all website addresses not contained on the filter's whitelist will be sent automatically to Microsoft without prompting the user. If you disable or do not configure this policy setting, the user will be prompted to decide the mode of operation for the phishing filter.",
"fixid": "F-15126r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn off Managing Phishing filter\" will be set to \u201cEnabled\u201d and \"Off\" selected.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\PhishingFilter\n\nCriteria: Set the value Enabled to REG_DWORD = 0.\n\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15495",
"ruleID": "SV-16342r1_rule",
"severity": "medium",
"title": "Turn off Managing Phishing filter is not disabled.",
"version": "DTBI330"
},
"V-15497": {
"checkid": "C-14520r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Allow active content from CDs to run on user machines\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_LOCALMACHINE_LOCKDOWN\\Settings\n\nCriteria: If the value LOCALMACHINE_CD_UNLOCK is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage whether users receive a dialog requesting permission for active content on a CD to run. If you enable this policy setting, active content on a CD will run without a prompt.\nIf you disable this policy setting, active content on a CD will always prompt before running. If you do not configure this policy, users can choose whether to be prompted before running active content on a CD.\n",
"fixid": "F-15129r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Allow active content from CDs to run on user machines\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_LOCALMACHINE_LOCKDOWN\\Settings\n\nCriteria: Set the value LOCALMACHINE_CD_UNLOCK to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15497",
"ruleID": "SV-16344r1_rule",
"severity": "medium",
"title": "Allow active content from CDs to run on user machines is not disabled.",
"version": "DTBI340"
},
"V-15499": {
"checkid": "C-14522r2_chk",
"checktext": "Note: Some legitimate software and controls may have an invalid signature. You should carefully test such software in isolation before it is allowed to be used on an organization's network.\n\nThe policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Allow software to run or install even if the signature is invalid\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Download\n\nCriteria: If the value RunInvalidSignatures is REG_DWORD = 0, this is not a finding.\n",
"description": "Microsoft ActiveX controls and file downloads often have digital signatures attached that vouch for both the file's integrity and the identity of the signer (creator) of the software. Such signatures help ensure that unmodified.",
"fixid": "F-15131r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Allow software to run or install even if the signature is invalid\" will be set to \u201cDisabled\u201d.",
"iacontrols": [
"DCMC-1"
],
"id": "V-15499",
"ruleID": "SV-16346r1_rule",
"severity": "medium",
"title": "Allow software to run or install even if the signature is invalid is not disabled.",
"version": "DTBI350"
},
"V-15500": {
"checkid": "C-14523r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Allow third-party browser extensions\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n \nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: If the value Enable Browser Extensions is REG_SZ = no, this is not a finding.\n",
"description": "This policy setting allows you to manage whether Internet Explorer will launch COM add-ons known as browser helper objects, such as toolbars. Browser helper objects may contain flaws such as buffer overruns which impact Internet Explorer's performance or stability. If you enable this policy setting, Internet Explorer automatically launches any browser helper objects that are installed on the user's computer. If you disable this policy setting, browser helper objects do not launch. If you do not configure this policy, Internet Explorer automatically launches any browser helper objects that are installed on the user's computer.",
"fixid": "F-15132r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Allow third-party browser extensions\" will be set to \u201cDisabled\u201d.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15500",
"ruleID": "SV-16347r2_rule",
"severity": "medium",
"title": "Allow third-party browser extensions are not disabled.",
"version": "DTBI355"
},
"V-15502": {
"checkid": "C-14525r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Check for server certificate revocation\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\n\nCriteria: If the value CertificateRevocation is REG_DWORD = 1, this is not a finding.\n",
"description": "This policy setting allows you to manage whether Internet Explorer will check revocation status of servers' certificates. Certificates are revoked when they have been compromised or are no longer valid, and this option protects users from submitting confidential data to a site that may be fraudulent or not secure. If you enable this policy setting, Internet Explorer will check to see if server certificates have been revoked. If you disable this policy setting, Internet Explorer will not check server certificates to see if they have been revoked. If you do not configure this policy setting, Internet Explorer will not check server certificates to see if they have been revoked.",
"fixid": "F-15134r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Check for server certificate revocation\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\n\nCriteria: Set the value CertificateRevocation to REG_DWORD = 1.",
"iacontrols": [
"IATS-1",
"IATS-2"
],
"id": "V-15502",
"ruleID": "SV-16349r1_rule",
"severity": "medium",
"title": "Check for server certificate revocation is not enabled.",
"version": "DTBI365"
},
"V-15503": {
"checkid": "C-14526r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Check for signatures on downloaded programs\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Download\n\nCriteria: If the value CheckExeSignatures is REG_SZ = yes, this is not a finding.\n",
"description": "This policy setting allows you to manage whether Internet Explorer checks for digital signatures (which identifies the publisher of signed software and verifies it hasn't been modified or tampered with) on user computers before downloading executable programs. If you enable this policy setting, Internet Explorer will check the digital signatures of executable programs and display their identities before downloading them to user computers.\nIf you disable this policy setting, Internet Explorer will not check the digital signatures of executable programs or display their identities before downloading them to user computers. If you do not configure this policy, Internet Explorer will not check the digital signatures of executable programs or display their identities before downloading them to user computers.\n",
"fixid": "F-15135r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> \"Check for signatures on downloaded programs\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Download\n\nCriteria: Set the value CheckExeSignatures to REG_SZ = yes.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15503",
"ruleID": "SV-16350r1_rule",
"severity": "medium",
"title": "Check for signatures on downloaded programs is not enabled.",
"version": "DTBI370"
},
"V-15504": {
"checkid": "C-14527r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> \"Intranet Sites: Include all network paths (UNCs)\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\n\nCriteria: If the value UNCAsIntranet is REG_DWORD = 0, this is not a finding.\n\n\n",
"description": "This policy setting controls whether URLs representing UNCs are mapped into the local Intranet security zone. If you enable this policy setting, all network paths are mapped into the Intranet Zone. If you disable this policy setting, network paths are not necessarily mapped into the Intranet Zone (other rules might map one there). If you do not configure this policy setting, users choose whether network paths are mapped into the Intranet Zone.",
"fixid": "F-15136r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> \"Intranet Sites: Include all network paths (UNCs)\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\n\nCriteria: Set the value UNCAsIntranet to REG_DWORD = 0.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15504",
"ruleID": "SV-16351r1_rule",
"severity": "medium",
"title": "Intranet Sites: Include all network paths (UNCs) are disabled. ",
"version": "DTBI375"
},
"V-15507": {
"checkid": "C-14530r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow script-initiated windows without size or position constraints\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 2102 is REG_DWORD = 3, this is not a finding.\n\n",
"description": "This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title and status bars.\nIf you enable this policy setting, Windows Restrictions security will not apply in this zone. The security zone runs without the added layer of security provided by this feature. If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. If you do not configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process.\n",
"fixid": "F-15139r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow script-initiated windows without size or position constraints\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 2102 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15507",
"ruleID": "SV-16354r1_rule",
"severity": "medium",
"title": "Allow script-initiated windows without size or position constraints for internet zone is not disabled.",
"version": "DTBI385"
},
"V-15508": {
"checkid": "C-14531r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow script-initiated windows without size or position constraints\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2102 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title and status bars.\nIf you enable this policy setting, Windows Restrictions security will not apply in this zone. The security zone runs without the added layer of security provided by this feature. If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. If you do not configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process.\n",
"fixid": "F-15140r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow script-initiated windows without size or position constraints\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 2102 to REG_DWORD = 3.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15508",
"ruleID": "SV-16355r1_rule",
"severity": "medium",
"title": "Allow script-initiated windows without size or position constraints for restricted sites zone are not disabled.",
"version": "DTBI390"
},
"V-15509": {
"checkid": "C-14532r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow Scriptlets\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1209 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether scriptlets can be allowed.\nIf you enable this policy setting, users will be able to run scriptlets.\nIf you disable this policy setting, users will not be able to run scriptlets.\nIf you do not configure this policy setting, a scriptlet can be enabled or disabled by the user.\n",
"fixid": "F-15141r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow Scriptlets\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1209 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15509",
"ruleID": "SV-16356r1_rule",
"severity": "medium",
"title": "Allow Scriptlets are not disabled.",
"version": "DTBI395"
},
"V-15513": {
"checkid": "C-14536r3_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Automatic prompting for file downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: If the value 2200 is REG_DWORD = 3, this is not a finding. ",
"description": "This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts.\nIf you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Information Bar instead of the file download dialog. Users can then click the Information Bar to allow the file download prompt.\n",
"fixid": "F-15145r3_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Automatic prompting for file downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: Set the value 2200 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15513",
"ruleID": "SV-16360r2_rule",
"severity": "medium",
"title": "Automatic prompting for file downloads dialog box is not disabled.",
"version": "DTBI415"
},
"V-15515": {
"checkid": "C-14538r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage permissions for Java applets.\nIf you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running.\nIf you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.",
"fixid": "F-15147r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-15515",
"ruleID": "SV-16362r2_rule",
"severity": "medium",
"title": "Java permissions for my computer are not disabled.",
"version": "DTBI425"
},
"V-15516": {
"checkid": "C-14539r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage permissions for Java applets.\nIf you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running.\nIf you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.",
"fixid": "F-15148r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-15516",
"ruleID": "SV-16363r2_rule",
"severity": "medium",
"title": "Java permissions for my computer group policy are not disabled.",
"version": "DTBI430"
},
"V-15517": {
"checkid": "C-14540r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage permissions for Java applets.\nIf you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running.\nIf you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.",
"fixid": "F-15149r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-15517",
"ruleID": "SV-16364r2_rule",
"severity": "medium",
"title": "Java permissions for group policy for local intranet zone are not disabled.",
"version": "DTBI435"
},
"V-15518": {
"checkid": "C-14541r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage permissions for Java applets.\nIf you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running.\nIf you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.",
"fixid": "F-15150r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-15518",
"ruleID": "SV-16365r2_rule",
"severity": "medium",
"title": "Java permissions for group policy for trusted sites zone are not disabled.",
"version": "DTBI440"
},
"V-15519": {
"checkid": "C-14542r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage permissions for Java applets.\nIf you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running.\nIf you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.",
"fixid": "F-15151r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-15519",
"ruleID": "SV-16366r2_rule",
"severity": "medium",
"title": "Java permissions for group policy for internet zone are not disabled.",
"version": "DTBI445"
},
"V-15520": {
"checkid": "C-14543r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage permissions for Java applets.\nIf you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running.\nIf you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.",
"fixid": "F-15152r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-15520",
"ruleID": "SV-16367r2_rule",
"severity": "medium",
"title": "Java permissions for group policy for restricted sites zone are not disabled.",
"version": "DTBI450"
},
"V-15521": {
"checkid": "C-14544r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Loose or un-compiled XAML files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 2402 is REG_DWORD = 3, this is not a finding.\n",
"description": "These are eXtensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that leverage the Windows Presentation Foundation. If you enable this policy setting and the dropdown box is set to Enable, .XAML files will be automatically loaded inside Internet Explorer 7.0. User will not be able to change this behavior. If the dropdown box is set to Prompt, users will receive a prompt for loading .XAML files. If you disable this policy setting, .XAML files will not be loaded inside Internet Explorer 7. User will not be able to change this behavior. If you do not configure this policy setting, users will have the freedom to decide whether to load XAML files inside Internet Explorer 7.0.",
"fixid": "F-15153r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Loose or un-compiled XAML files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 2402 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15521",
"ruleID": "SV-16368r1_rule",
"severity": "medium",
"title": "Loose or un-compiled XAML files for internet zone are not disabled.",
"version": "DTBI455"
},
"V-15522": {
"checkid": "C-14545r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Loose or un-compiled XAML files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2402 is REG_DWORD = 3, this is not a finding.\n",
"description": "These are eXtensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that leverage the Windows Presentation Foundation. If you enable this policy setting and the dropdown box is set to Enable, .XAML files will be automatically loaded inside Internet Explorer 7.0. User will not be able to change this behavior. If the dropdown box is set to Prompt, users will receive a prompt for loading .XAML files. If you disable this policy setting, .XAML files will not be loaded inside Internet Explorer 7. User will not be able to change this behavior. If you do not configure this policy setting, users will have the freedom to decide whether to load XAML files inside Internet Explorer 7.0.",
"fixid": "F-15154r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Loose or un-compiled XAML files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 2402 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15522",
"ruleID": "SV-16369r1_rule",
"severity": "medium",
"title": "Loose or un-compiled XAML files for restricted sites zone are not disabled.",
"version": "DTBI460"
},
"V-15523": {
"checkid": "C-14547r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Open files based on content, not file extension\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 2100 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Internet Explorer of the file type based on a bit signature. If you enable this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. The security zone will run without the added layer of security provided by this feature. If you disable this policy setting, the actions that may be harmful cannot run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process.\nIf you do not configure this policy setting, the MIME Sniffing Safety Feature will not apply in this zone.\n",
"fixid": "F-15156r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Open files based on content, not file extension\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 2100 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15523",
"ruleID": "SV-16370r1_rule",
"severity": "medium",
"title": "Open files based on content, not file extension for internet zone are not disabled.",
"version": "DTBI465"
},
"V-15524": {
"checkid": "C-14548r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Open files based on content, not file extension\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2100 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Internet Explorer of the file type based on a bit signature. If you enable this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. The security zone will run without the added layer of security provided by this feature. If you disable this policy setting, the actions that may be harmful cannot run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process.\nIf you do not configure this policy setting, the MIME Sniffing Safety Feature will not apply in this zone.\n",
"fixid": "F-15157r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Open files based on content, not file extension\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 2100 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15524",
"ruleID": "SV-16371r1_rule",
"severity": "medium",
"title": "Open files based on content, not file extension for restricted sites zone are not disabled.",
"version": "DTBI470"
},
"V-15525": {
"checkid": "C-14549r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Turn Off First-Run Opt-In\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1208 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting controls the First Run response that users see on a zone by zone basis. When a user encounters a new control that has not previously run in Internet Explorer, they may be prompted to approve the control. This feature determines if the user gets the prompt or not. \nIf you enable this policy setting, the Gold Bar prompt will be turned off in the corresponding zone. If you disable this policy setting, the Gold Bar prompt will be turned on in the corresponding zone. If you do not configure this policy setting, the first-run prompt is turned off by default.\n",
"fixid": "F-15158r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Turn Off First-Run Opt-In\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1208 to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15525",
"ruleID": "SV-16372r1_rule",
"severity": "medium",
"title": "Turn Off First-Run Opt-In for internet zone is not disabled.",
"version": "DTBI475"
},
"V-15526": {
"checkid": "C-14550r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Turn Off First-Run Opt-In\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1208 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting controls the First Run response that users see on a zone by zone basis. When a user encounters a new control that has not previously run in Internet Explorer, they may be prompted to approve the control. This feature determines if the user gets the prompt or not. \nIf you enable this policy setting, the Gold Bar prompt will be turned off in the corresponding zone. If you disable this policy setting, the Gold Bar prompt will be turned on in the corresponding zone. If you do not configure this policy setting, the first-run prompt is turned off by default.\n",
"fixid": "F-15159r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Turn Off First-Run Opt-In\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1208 to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15526",
"ruleID": "SV-16373r1_rule",
"severity": "medium",
"title": "Turn Off First-Run Opt-In for restricted sites zone are not disabled.",
"version": "DTBI480"
},
"V-15527": {
"checkid": "C-14551r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Turn on Protected Mode\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 2500 is REG_DWORD = 0, this is not a finding.\n",
"description": "Protected mode protects Internet Explorer from exploited vulnerabilities by reducing the locations Internet Explorer can write to in the registry and the file system. If you enable this policy setting, Protected Mode will be turned on. Users will not be able to turn off protected mode. If you disable this policy setting, Protected Mode will be turned off. It will revert to Internet Explorer 6 behavior that allows for Internet Explorer to write to the registry and the file system. Users will not be able to turn on protected mode. If you do not configure this policy, users will be able to turn on or off protected mode.\nRequires Windows Vista; will be ignored by Windows XP.\n",
"fixid": "F-15160r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Turn on Protected Mode\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 2500 to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15527",
"ruleID": "SV-16374r1_rule",
"severity": "medium",
"title": "Turn on Protected Mode internet zone is not enabled.",
"version": "DTBI485"
},
"V-15528": {
"checkid": "C-14552r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Turn on Protected Mode\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2500 is REG_DWORD = 0, this is not a finding.\n",
"description": "VISTA Only\nProtected mode protects Internet Explorer from exploited vulnerabilities by reducing the locations Internet Explorer can write to in the registry and the file system. If you enable this policy setting, Protected Mode will be turned on. Users will not be able to turn off protected mode. If you disable this policy setting, Protected Mode will be turned off. It will revert to Internet Explorer 6 behavior that allows for Internet Explorer to write to the registry and the file system. Users will not be able to turn on protected mode. If you do not configure this policy, users will be able to turn on or off protected mode.\nRequires Windows Vista; will be ignored by Windows XP.\n",
"fixid": "F-15161r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Turn on Protected Mode\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 2500 to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15528",
"ruleID": "SV-16375r1_rule",
"severity": "medium",
"title": "Turn on Protected Mode for restricted sites zone is not enabled.",
"version": "DTBI490"
},
"V-15529": {
"checkid": "C-14553r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Use Pop-up Blocker\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1809 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. If you enable this policy setting, most unwanted pop-up windows are prevented from appearing. If you disable this policy setting, pop-up windows are not prevented from appearing. If you do not configure this policy setting, most unwanted pop-up windows are prevented from appearing.",
"fixid": "F-15162r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Use Pop-up Blocker\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1809 to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15529",
"ruleID": "SV-16376r1_rule",
"severity": "medium",
"title": "Use Pop-up Blocker for internet zone is not enabled.",
"version": "DTBI495"
},
"V-15530": {
"checkid": "C-14554r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Use Pop-up Blocker\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1809 is REG_DWORD = 0, this is not a finding.\n",
"description": "This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. If you enable this policy setting, most unwanted pop-up windows are prevented from appearing. If you disable this policy setting, pop-up windows are not prevented from appearing. If you do not configure this policy setting, most unwanted pop-up windows are prevented from appearing.",
"fixid": "F-15163r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Use Pop-up Blocker\" will be set to \u201cEnabled\u201d and \"Enable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1809 to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15530",
"ruleID": "SV-16377r1_rule",
"severity": "medium",
"title": "Use Pop-up Blocker for restricted sites zone is not enabled.",
"version": "DTBI500"
},
"V-15533": {
"checkid": "C-14557r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Web sites in less privileged Web content zones can navigate into this zone\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 2101 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone.\nIf you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone.\n",
"fixid": "F-15166r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Web sites in less privileged Web content zones can navigate into this zone\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria:Set the value 2101 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15533",
"ruleID": "SV-16380r1_rule",
"severity": "medium",
"title": "Web sites in less privileged Web content zones can navigate into internet zone is not disabled.",
"version": "DTBI515"
},
"V-15534": {
"checkid": "C-14558r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Web sites in less privileged Web content zones can navigate into this zone\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2101 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone.\nIf you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone.\n",
"fixid": "F-15168r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Web sites in less privileged Web content zones can navigate into this zone\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 2101 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15534",
"ruleID": "SV-16381r1_rule",
"severity": "medium",
"title": "Web sites in less privileged Web content zones can navigate into restricted sites zone is not disabled.",
"version": "DTBI520"
},
"V-15545": {
"checkid": "C-14569r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow binary and script behaviors\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2000 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage dynamic binary and script behaviors: components that encapsulate specific functionality for HTML elements to which they were attached. If you enable this policy setting, binary and script behaviors are available. If you select Administrator approved in the drop-down box, only behaviors listed in the Admin-approved Behaviors under Binary Behaviors Security Restriction policy are available. If you disable this policy setting, binary and script behaviors are not available unless applications have implemented a custom security manager. If you do not configure this policy setting, binary and script behaviors are available.",
"fixid": "F-15179r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow binary and script behaviors\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 2000 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15545",
"ruleID": "SV-16392r1_rule",
"severity": "medium",
"title": "Allow binary and script behaviors are not disabled.",
"version": "DTBI575"
},
"V-15546": {
"checkid": "C-14570r3_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Automatic prompting for file downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2200 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Information Bar instead of the file download dialog. Users can then click the Information Bar to allow the file download prompt.",
"fixid": "F-15180r3_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Automatic prompting for file downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 2200 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15546",
"ruleID": "SV-16393r2_rule",
"severity": "medium",
"title": "Automatic prompting for file downloads is not disabled.",
"version": "DTBI580"
},
"V-15548": {
"checkid": "C-14572r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_HANDLING\n\nCriteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. The Consistent MIME Handling\\Internet Explorer Processes policy setting determines whether Internet Explorer requires that all file-type information provided by Web servers be consistent. For example, if the MIME type of a file is text/plain but the MIME data indicates that the file is really an executable file, Internet Explorer changes its extension to reflect this executable status. This capability helps ensure that executable code cannot masquerade as other types of data that may be trusted. If you enable this policy setting, Internet Explorer examines all received files and enforces consistent MIME data for them. If you disable or do not configure this policy setting, Internet Explorer does not require consistent MIME data for all received files and will use the MIME data provided by the file. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistent and properly labeled helps prevent malicious file downloads from infecting your network. Therefore, this appendix recommends you configure this policy as Enabled for all environments specified in this guide.",
"fixid": "F-15182r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_HANDLING\n\nCriteria: Set the value (Reserved) to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15548",
"ruleID": "SV-16395r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MIME handling is not enabled. (Reserved)",
"version": "DTBI590"
},
"V-15549": {
"checkid": "C-14573r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_SNIFFING\n\nCriteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.\n",
"description": "MIME sniffing is the process of examining the content of a MIME file to determine its context \u2014 whether it is a data file, an executable file, or some other type of file. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a more dangerous file type. When set to Enabled, MIME sniffing will never promote a file of one type to a more dangerous file type. Disabling MIME sniffing configures Internet Explorer processes to allow a MIME sniff that promotes a file of one type to a more dangerous file type. For example, promoting a text file to an executable file is a dangerous promotion because any code in the supposed text file would be executed. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistently handled helps prevent malicious file downloads from infecting your network. Therefore, this appendix recommends you configure this policy as Enabled for all environments specified in this guide. Note: This setting works in conjunction with, but does not replace, the Consistent MIME Handling settings.",
"fixid": "F-15183r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_SNIFFING\n\nCriteria: Set the value (Reserved) to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15549",
"ruleID": "SV-16396r2_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MIME sniffing is not enabled. (Reserved)",
"version": "DTBI595"
},
"V-15550": {
"checkid": "C-14574r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_DISABLE_MK_PROTOCOL \n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding\n",
"description": "The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. Setting this policy to Enabled blocks the MK protocol for Windows Explorer and Internet Explorer, which causes resources that use the MK protocol to fail. Disabling this setting allows applications to use the MK protocol API. Because the MK protocol is not widely used, it should be blocked wherever it is not needed. This appendix recommends you configure this setting to Enabled to block the MK protocol unless you specifically need it in your environment. Note: Because resources that use the MK protocol will fail when you deploy this setting, you should ensure that none of your applications use the MK protocol.\n\n",
"fixid": "F-15184r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_DISABLE_MK_PROTOCOL \n\nCriteria: Set the value explorer.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15550",
"ruleID": "SV-16397r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MK protocol is not enabled. (Explorer)",
"version": "DTBI600"
},
"V-15551": {
"checkid": "C-14575r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_DISABLE_MK_PROTOCOL \n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.\n",
"description": "The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. Setting this policy to Enabled blocks the MK protocol for Windows Explorer and Internet Explorer, which causes resources that use the MK protocol to fail. Disabling this setting allows applications to use the MK protocol API. Because the MK protocol is not widely used, it should be blocked wherever it is not needed. This appendix recommends you configure this setting to Enabled to block the MK protocol unless you specifically need it in your environment. Note: Because resources that use the MK protocol will fail when you deploy this setting, you should ensure that none of your applications use the MK protocol.",
"fixid": "F-15185r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_DISABLE_MK_PROTOCOL \n\nCriteria: Set the value iexplore.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15551",
"ruleID": "SV-16398r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MK protocol is not enabled. (IExplore)",
"version": "DTBI605"
},
"V-15552": {
"checkid": "C-14576r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_ZONE_ELEVATION \n\nCriteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer places restrictions on each Web page it opens that are dependent upon the location of the Web page (such as Internet zone, Intranet zone, or Local Machine zone). Web pages on a local computer have the fewest security restrictions and reside in the Local Machine zone, which makes the Local Machine security zone a prime target for malicious attackers. If you enable this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. This approach stops content running in one zone from gaining the elevated privileges of another zone. If you disable this policy setting, no zone receives such protection for Internet Explorer processes. Because of the severity and relative frequency of zone elevation attacks, this appendix recommends that you configure this setting as Enabled in all environments.\n\n",
"fixid": "F-15186r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_ZONE_ELEVATION \n\nCriteria: Set the value (Reserved) to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15552",
"ruleID": "SV-16399r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Zone Elevation is not enabled. (Reserved)",
"version": "DTBI610"
},
"V-15556": {
"checkid": "C-14580r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_FILEDOWNLOAD \n\nCriteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.\n",
"description": "In certain circumstances, Web sites can initiate file download prompts without interaction from users. This technique can allow Web sites to put unauthorized files on users' hard drives if they click the wrong button and accept the download. If you configure the Restrict File Download\\Internet Explorer Processes policy setting to Enabled, file download prompts that are not user-initiated are blocked for Internet Explorer processes. If you configure this policy setting as Disabled, prompting will occur for file downloads that are not user-initiated for Internet Explorer processes. Note: This setting is configured as Enabled in all environments specified in this guide to help prevent attackers from placing arbitrary code on users' computers.",
"fixid": "F-15190r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_FILEDOWNLOAD \n\nCriteria: Set the value (Reserved) to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15556",
"ruleID": "SV-16403r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Download prompt is not enabled. (Reserved)",
"version": "DTBI630"
},
"V-15557": {
"checkid": "C-14581r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet \nExplorer\\Main\\FeatureControl\\FEATURE_RESTRICT_FILEDOWNLOAD \n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.\n",
"description": "In certain circumstances, Web sites can initiate file download prompts without interaction from users. This technique can allow Web sites to put unauthorized files on users' hard drives if they click the wrong button and accept the download. If you configure the Restrict File Download\\Internet Explorer Processes policy setting to Enabled, file download prompts that are not user-initiated are blocked for Internet Explorer processes. If you configure this policy setting as Disabled, prompting will occur for file downloads that are not user-initiated for Internet Explorer processes. Note: This setting is configured as Enabled in all environments specified in this guide to help prevent attackers from placing arbitrary code on users' computers.",
"fixid": "F-15191r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet \nExplorer\\Main\\FeatureControl\\FEATURE_RESTRICT_FILEDOWNLOAD \n\nCriteria: Set the value explorer.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15557",
"ruleID": "SV-16404r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Download prompt is not enabled. Explorer",
"version": "DTBI635"
},
"V-15558": {
"checkid": "C-14582r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_FILEDOWNLOAD\n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.\n",
"description": "In certain circumstances, Web sites can initiate file download prompts without interaction from users. This technique can allow Web sites to put unauthorized files on users' hard drives if they click the wrong button and accept the download. If you configure the Restrict File Download\\Internet Explorer Processes policy setting to Enabled, file download prompts that are not user-initiated are blocked for Internet Explorer processes. If you configure this policy setting as Disabled, prompting will occur for file downloads that are not user-initiated for Internet Explorer processes. Note: This setting is configured as Enabled in all environments specified in this guide to help prevent attackers from placing arbitrary code on users' computers.",
"fixid": "F-15192r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_FILEDOWNLOAD\n\nCriteria: Set the value iexplore.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15558",
"ruleID": "SV-16405r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Download prompt is not enabled. IExplore",
"version": "DTBI640"
},
"V-15559": {
"checkid": "C-14583r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_WINDOW_RESTRICTIONS\n\nCriteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable Web sites will resize windows to either hide other windows or force you to interact with a window that contains malicious code. The Scripted Window Security Restrictions security feature restricts pop-up windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or hide other windows\u2019 title and status bars. If you enable the Scripted Window Security Restrictions\\Internet Explorer Processes policy setting, pop-up windows and other restrictions apply for Windows Explorer and Internet Explorer processes. If you disable or do not configure this policy setting, scripts can continue to create pop-up windows and windows that hide other windows. This appendix recommends you configure this setting to Enabled to help prevent malicious Web sites from controlling your Internet Explorer windows or fooling users into clicking on the wrong window.",
"fixid": "F-15193r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_WINDOW_RESTRICTIONS\n\nCriteria: Set the value (Reserved) is REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15559",
"ruleID": "SV-16406r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for restricting pop-up windows is not enabled. (Reserved)",
"version": "DTBI645"
},
"V-15560": {
"checkid": "C-14584r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Run .NET Framework-reliant components not signed with Authenticode\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: If the value 2004 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether .NET Framework components that are signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. \nIf you enable this policy setting, Internet Explorer will execute signed managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute signed managed components. If you disable this policy setting, Internet Explorer will not execute signed managed components. If you do not configure this policy setting, Internet Explorer will execute signed managed components.\n\nThis policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link.\nIf you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. If you disable this policy setting, Internet Explorer will not execute unsigned managed components. If you do not configure this policy setting, Internet Explorer will execute unsigned managed components.\n",
"fixid": "F-15194r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Run .NET Framework-reliant components not signed with Authenticode\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: Set the value 2004 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15560",
"ruleID": "SV-16407r1_rule",
"severity": "medium",
"title": "Run .NET Framework-reliant components not signed with Authenticode are not disabled.",
"version": "DTBI650"
},
"V-15561": {
"checkid": "C-14585r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Run .NET Framework-reliant components signed with Authenticode\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 2001 is REG_DWORD = 3, this is not a finding.\n\n",
"description": "This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link.\nIf you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. If you disable this policy setting, Internet Explorer will not execute unsigned managed components. If you do not configure this policy setting, Internet Explorer will execute unsigned managed components.\n",
"fixid": "F-15195r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Run .NET Framework-reliant components signed with Authenticode\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: Set the value 2001 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15561",
"ruleID": "SV-16408r1_rule",
"severity": "medium",
"title": "Run .NET Framework-reliant components signed with Authenticode are not disabled.",
"version": "DTBI655"
},
"V-15562": {
"checkid": "C-14586r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Scripting of Java applets\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1402 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether applets are exposed to scripts within the zone. If you enable this policy setting, scripts can access applets automatically without user intervention. If you select Prompt in the drop-down box, users are queried to choose whether to allow scripts to access applets. If you disable this policy setting, scripts are prevented from accessing applets. If you do not configure this policy setting, scripts can access applets automatically without user intervention.",
"fixid": "F-15196r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Scripting of Java applets\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1402 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15562",
"ruleID": "SV-16409r2_rule",
"severity": "medium",
"title": "Scripting of Java applets is not disabled.",
"version": "DTBI670"
},
"V-15563": {
"checkid": "C-14587r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> \"Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools\" will be set to \u201cEnabled\u201d and \"blank or empty\" selection box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: The Update_Check_Page value must exist. The value must contain no data value. If the value Update_Check_Page is not present this is a finding.\n",
"description": "This policy setting allows checking for updates for Internet Explorer from the specified URL, included by default in Internet Explorer. If you enable this policy setting, users will not be able to change the URL to be displayed for checking updates to Internet Explorer and Internet Tools. You must specify the URL to be displayed for checking updates to Internet Explorer and Internet Tools. If you disable or do not configure this policy setting, users will be able to change the URL to be displayed for checking updates to Internet Explorer and Internet Tools.",
"fixid": "F-15197r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> \"Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools\" will be set to \u201cEnabled\u201d and \"blank or empty\" selection box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: Create the value Update_Check_Page .\nThe value must contain no data. ",
"iacontrols": [
"ECSC-1"
],
"id": "V-15563",
"ruleID": "SV-16410r1_rule",
"severity": "medium",
"title": "Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools is not disabled.",
"version": "DTBI675"
},
"V-15564": {
"checkid": "C-14588r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> \"Turn off configuring the update check interval (in days)\" will be set to \u201cEnabled\u201d and \"30\" selected from drop down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: If the value Update_Check_Interval is REG_DWORD = 30 (Decimal), this is not a finding.\n",
"description": "This setting specifies the update check interval. The default value is 30 days.\nIf you enable this policy setting, the user will not be able to configure the update check interval. You have to specify the update check interval.\nIf you disable or do not configure this policy setting, the user will have the freedom to configure the update check interval.\n",
"fixid": "F-15198r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> \"Turn off configuring the update check interval (in days)\" will be set to \u201cEnabled\u201d and \"30\" selected from drop down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: Set the value Update_Check_Interval to REG_DWORD = 30 (Decimal).",
"iacontrols": [
"ECSC-1"
],
"id": "V-15564",
"ruleID": "SV-16411r1_rule",
"severity": "medium",
"title": "Turn off configuring the update check interval is not disabled.",
"version": "DTBI680"
},
"V-15565": {
"checkid": "C-14604r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_HANDLING\n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. The Consistent MIME Handling\\Internet Explorer Processes policy setting determines whether Internet Explorer requires that all file-type information provided by Web servers be consistent. For example, if the MIME type of a file is text/plain but the MIME data indicates that the file is really an executable file, Internet Explorer changes its extension to reflect this executable status. This capability helps ensure that executable code cannot masquerade as other types of data that may be trusted. If you enable this policy setting, Internet Explorer examines all received files and enforces consistent MIME data for them. If you disable or do not configure this policy setting, Internet Explorer does not require consistent MIME data for all received files and will use the MIME data provided by the file. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistent and properly labeled helps prevent malicious file downloads from infecting your network. Therefore, this appendix recommends you configure this policy as Enabled for all environments specified in this guide.",
"fixid": "F-15199r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_HANDLING\n\nCriteria: Set the value explorer.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15565",
"ruleID": "SV-16412r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MIME handling is not enabled. Explorer",
"version": "DTBI592"
},
"V-15566": {
"checkid": "C-14605r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_HANDLING\n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. The Consistent MIME Handling\\Internet Explorer Processes policy setting determines whether Internet Explorer requires that all file-type information provided by Web servers be consistent. For example, if the MIME type of a file is text/plain but the MIME data indicates that the file is really an executable file, Internet Explorer changes its extension to reflect this executable status. This capability helps ensure that executable code cannot masquerade as other types of data that may be trusted. If you enable this policy setting, Internet Explorer examines all received files and enforces consistent MIME data for them. If you disable or do not configure this policy setting, Internet Explorer does not require consistent MIME data for all received files and will use the MIME data provided by the file. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistent and properly labeled helps prevent malicious file downloads from infecting your network. Therefore, this appendix recommends you configure this policy as Enabled for all environments specified in this guide.",
"fixid": "F-15200r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_HANDLING\n\nCriteria: Set the value iexplore.exe to REG_SZ = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15566",
"ruleID": "SV-16413r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MIME handling is not enabled. IExplore",
"version": "DTBI594"
},
"V-15568": {
"checkid": "C-14607r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_DISABLE_MK_PROTOCOL \n\nCriteria: If the value (reserved) is REG_SZ = 1, this is not a finding\n",
"description": "The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. Setting this policy to Enabled blocks the MK protocol for Windows Explorer and Internet Explorer, which causes resources that use the MK protocol to fail. Disabling this setting allows applications to use the MK protocol API. Because the MK protocol is not widely used, it should be blocked wherever it is not needed. This appendix recommends you configure this setting to Enabled to block the MK protocol unless you specifically need it in your environment. Note: Because resources that use the MK protocol will fail when you deploy this setting, you should ensure that none of your applications use the MK protocol.",
"fixid": "F-15202r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_DISABLE_MK_PROTOCOL \n\nCriteria: Set the value (reserved) to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15568",
"ruleID": "SV-16415r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MK protocol is not enabled. (Reserved)",
"version": "DTBI599"
},
"V-15569": {
"checkid": "C-14608r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_ZONE_ELEVATION \n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer places restrictions on each Web page it opens that are dependent upon the location of the Web page (such as Internet zone, Intranet zone, or Local Machine zone). Web pages on a local computer have the fewest security restrictions and reside in the Local Machine zone, which makes the Local Machine security zone a prime target for malicious attackers. If you enable this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. This approach stops content running in one zone from gaining the elevated privileges of another zone. If you disable this policy setting, no zone receives such protection for Internet Explorer processes. Because of the severity and relative frequency of zone elevation attacks, this appendix recommends that you configure this setting as Enabled in all environments.",
"fixid": "F-15203r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_ZONE_ELEVATION \n\nCriteria: Set the value explorer.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15569",
"ruleID": "SV-16416r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Zone Elevation is not enabled. Explorer",
"version": "DTBI612"
},
"V-15570": {
"checkid": "C-14630r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_ZONE_ELEVATION \n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.",
"description": "Internet Explorer places restrictions on each Web page it opens that are dependent upon the location of the Web page (such as Internet zone, Intranet zone, or Local Machine zone). Web pages on a local computer have the fewest security restrictions and reside in the Local Machine zone, which makes the Local Machine security zone a prime target for malicious attackers. If you enable this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. This approach stops content running in one zone from gaining the elevated privileges of another zone. If you disable this policy setting, no zone receives such protection for Internet Explorer processes. Because of the severity and relative frequency of zone elevation attacks, this appendix recommends that you configure this setting as Enabled in all environments.",
"fixid": "F-15204r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_ZONE_ELEVATION \n\nCriteria: Set the value iexplore.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15570",
"ruleID": "SV-16417r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Zone Elevation is not enabled. IExplore",
"version": "DTBI614"
},
"V-15571": {
"checkid": "C-14631r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_WINDOW_RESTRICTIONS\n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable Web sites will resize windows to either hide other windows or force you to interact with a window that contains malicious code. The Scripted Window Security Restrictions security feature restricts pop-up windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or hide other windows\u2019 title and status bars. If you enable the Scripted Window Security Restrictions\\Internet Explorer Processes policy setting, pop-up windows and other restrictions apply for Windows Explorer and Internet Explorer processes. If you disable or do not configure this policy setting, scripts can continue to create pop-up windows and windows that hide other windows. This appendix recommends you configure this setting to Enabled to help prevent malicious Web sites from controlling your Internet Explorer windows or fooling users into clicking on the wrong window.",
"fixid": "F-15205r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_WINDOW_RESTRICTIONS\n\nCriteria: Set the value explorer.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15571",
"ruleID": "SV-16418r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for restricting pop-up windows is not enabled. Explorer",
"version": "DTBI647"
},
"V-15572": {
"checkid": "C-14632r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_WINDOW_RESTRICTIONS \n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.\n",
"description": "Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable Web sites will resize windows to either hide other windows or force you to interact with a window that contains malicious code. The Scripted Window Security Restrictions security feature restricts pop-up windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or hide other windows\u2019 title and status bars. If you enable the Scripted Window Security Restrictions\\Internet Explorer Processes policy setting, pop-up windows and other restrictions apply for Windows Explorer and Internet Explorer processes. If you disable or do not configure this policy setting, scripts can continue to create pop-up windows and windows that hide other windows. This appendix recommends you configure this setting to Enabled to help prevent malicious Web sites from controlling your Internet Explorer windows or fooling users into clicking on the wrong window.",
"fixid": "F-15206r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_WINDOW_RESTRICTIONS\n\nCriteria: Set the value iexplore.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15572",
"ruleID": "SV-16419r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for restricting pop-up windows is not enabled. IExplore",
"version": "DTBI649"
},
"V-15574": {
"checkid": "C-14634r1_chk",
"checktext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable AutoComplete for forms\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: If the value Use FormSuggest is REG_SZ = no, this is not a finding.\n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: If the value FormSuggest is REG_DWORD = 1, this is not a finding.",
"description": "This AutoComplete feature suggests possible matches when users are filling up forms. If you enable this setting, the user is not suggested matches when filling forms. The user cannot change it. If you disable this setting, the user is suggested possible matches when filling forms. The user cannot change it.\nIf you do not configure this setting, the user has the freedom to turn on the auto-complete feature for forms. To display this option, the users open the Internet Options dialog box, click the Contents Tab and click the Settings button.\n",
"fixid": "F-15208r1_fix",
"fixtext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable AutoComplete for forms\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: Set the value Use FormSuggest to REG_SZ = no.\n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: Set the value FormSuggest to REG_DWORD = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15574",
"ruleID": "SV-16421r1_rule",
"severity": "medium",
"title": "Disable AutoComplete for forms is not enabled.",
"version": "DTBI690"
},
"V-15575": {
"checkid": "C-14635r1_chk",
"checktext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable external branding of Internet Explorer\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Restrictions\n\nCriteria: If the value NoExternalBranding is REG_DWORD = 1, this is not a finding.\n",
"description": "Prevents branding of Internet programs, such as customization of Internet Explorer and Outlook Express logos and title bars, by another party. If you enable this policy, it prevents customization of the browser by another party, such as an Internet service provider or Internet content provider. If you disable this policy or do not configure it, users could install customizations from another party-for example, when signing up for Internet services. This policy is intended for administrators who want to maintain a consistent browser across an organization.",
"fixid": "F-15209r1_fix",
"fixtext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable external branding of Internet Explorer\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Restrictions\n\nCriteria: Set the value NoExternalBranding to REG_DWORD = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15575",
"ruleID": "SV-16422r1_rule",
"severity": "medium",
"title": "Disable external branding of Internet Explorer is not enabled.",
"version": "DTBI695"
},
"V-15579": {
"checkid": "C-14639r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn off Crash Detection\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Restrictions\n\nCriteria: If the value NoCrashDetection is REG_DWORD = 1, this is not a finding.\n",
"description": "The Turn off Crash Detection policy setting allows you to manage the crash detection feature of add-on management in Internet Explorer. If you enable this policy setting, a crash in Internet Explorer will be similar to one on a computer running Windows XP Professional Service Pack 1 and earlier: Windows Error Reporting will be invoked. If you disable this policy setting, the crash detection feature in add-on management will be functional. Because Internet Explorer crash report information could contain sensitive information from the computer's memory, this appendix recommends you configure this option to Enabled unless you are experiencing frequent repeated crashes and need to report them for follow-up troubleshooting. In those cases you could temporarily configure the setting to Disabled.",
"fixid": "F-15213r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn off Crash Detection\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Restrictions\n\nCriteria:Set the value NoCrashDetection to REG_DWORD = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15579",
"ruleID": "SV-16426r1_rule",
"severity": "medium",
"title": "Turn off Crash Detection is not enabled.",
"version": "DTBI715"
},
"V-15580": {
"checkid": "C-14641r1_chk",
"checktext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Advanced Settings -> Browsing -> \"Turn off page transitions\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: If the value Page_Transitions is REG_DWORD = 0, this is not a finding.",
"description": "This policy setting specifies if, as you move from one Web page to another, Internet Explorer fades out of the page you are leaving and fades into the page to which you are going. If you enable this policy setting, page transitions will be turned off. The user cannot change this behavior. If you disable this policy setting, page transitions will be turned on. The user cannot change this behavior. If you do not configure this policy setting, the user can turn on or off page transitions.",
"fixid": "F-15215r1_fix",
"fixtext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Advanced Settings -> Browsing -> \"Turn off page transitions\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: Set the value Page_Transitions to REG_DWORD = 0.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15580",
"ruleID": "SV-16427r1_rule",
"severity": "medium",
"title": "Turn off page transitions is not enabled.",
"version": "DTBI720"
},
"V-15581": {
"checkid": "C-14640r1_chk",
"checktext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn on the auto-complete feature for user names and passwords on forms\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: If the value FormSuggest Passwords is REG_SZ = no, this is not a finding.\n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: If the value FormSuggest Passwords is REG_DWORD = 1, this is not a finding.",
"description": "This AutoComplete feature can remember and suggest User names and passwords on Forms. If you enable this setting, the user cannot change \"User name and passwords on forms\" or \"prompt me to save passwords\". The Auto Complete feature for User names and passwords on Forms will be turned on. You have to decide whether to select \"prompt me to save passwords\". If you disable this setting the user cannot change \"User name and passwords on forms\" or \"prompt me to save passwords\". The Auto Complete feature for User names and passwords on Forms is turned off. The user also cannot opt to be prompted to save passwords. If you do not configure this setting, the user has the freedom of turning on Auto complete for User name and passwords on forms and the option of prompting to save passwords. To display this option, the users open the Internet Options dialog box, click the Contents Tab and click the Settings button.",
"fixid": "F-15216r1_fix",
"fixtext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Turn on the auto-complete feature for user names and passwords on forms\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: Set the value FormSuggest Passwords to REG_SZ = no.\n\nHKCU\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: Set the value FormSuggest Passwords to REG_DWORD = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15581",
"ruleID": "SV-16428r1_rule",
"severity": "medium",
"title": "Turn on the auto-complete feature for user names and passwords on forms are not disabled.",
"version": "DTBI725"
},
"V-15582": {
"checkid": "C-14642r1_chk",
"checktext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Advanced Settings -> Internet Connection Wizard Settings -> \"Turn on the Internet Connection Wizard Auto Detect\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Connection Wizard\n\nCriteria: If the value DisableICW is REG_DWORD = 1, this is not a finding.",
"description": "This policy setting determines if the Internet Connection Wizard was completed. If it was not completed, it launches the Internet Connection Wizard. If you enable this policy setting, the Internet Connection Wizard is launched automatically if it was not completed before. The user cannot prevent the wizard from launching. If you disable this policy setting, the Internet Connection Wizard is not launched automatically. The user can launch the wizard manually. If you do not configure this policy setting, the user will have the freedom to decide whether the Internet Connection Wizard should be launched automatically.",
"fixid": "F-15217r1_fix",
"fixtext": "The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Advanced Settings -> Internet Connection Wizard Settings -> \"Turn on the Internet Connection Wizard Auto Detect\" will be set to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKCU\\Software\\Policies\\Microsoft\\Internet Connection Wizard\n\nCriteria: Set the value DisableICW to REG_DWORD = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-15582",
"ruleID": "SV-16429r1_rule",
"severity": "medium",
"title": "Turn on the Internet Connection Wizard Auto Detect is not disabled.",
"version": "DTBI730"
},
"V-15603": {
"checkid": "C-15225r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_SNIFFING\n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.\n",
"description": "MIME sniffing is the process of examining the content of a MIME file to determine its context \u2014 whether it is a data file, an executable file, or some other type of file. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a more dangerous file type. When set to Enabled, MIME sniffing will never promote a file of one type to a more dangerous file type. Disabling MIME sniffing configures Internet Explorer processes to allow a MIME sniff that promotes a file of one type to a more dangerous file type. For example, promoting a text file to an executable file is a dangerous promotion because any code in the supposed text file would be executed. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistently handled helps prevent malicious file downloads from infecting your network. Therefore, this appendix recommends you configure this policy as Enabled for all environments specified in this guide. Note: This setting works in conjunction with, but does not replace, the Consistent MIME handling settings.",
"fixid": "F-15424r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_SNIFFING\n\nCriteria: If the value explorer.exe is REG_SZ = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15603",
"ruleID": "SV-16492r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MIME sniffing is not enabled. Explorer",
"version": "DTBI596"
},
"V-15604": {
"checkid": "C-15226r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_SNIFFING\n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.\n",
"description": "MIME sniffing is the process of examining the content of a MIME file to determine its context \u2014 whether it is a data file, an executable file, or some other type of file. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a more dangerous file type. When set to Enabled, MIME sniffing will never promote a file of one type to a more dangerous file type. Disabling MIME sniffing configures Internet Explorer processes to allow a MIME sniff that promotes a file of one type to a more dangerous file type. For example, promoting a text file to an executable file is a dangerous promotion because any code in the supposed text file would be executed. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistently handled helps prevent malicious file downloads from infecting your network. Therefore, this appendix recommends you configure this policy as Enabled for all environments specified in this guide. Note: This setting works in conjunction with, but does not replace, the Consistent MIME handling settings.",
"fixid": "F-15425r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_MIME_SNIFFING\n\nCriteria: If the value iexplore.exe is REG_SZ = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-15604",
"ruleID": "SV-16493r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes for MIME sniffing is not enabled. IExplore",
"version": "DTBI597"
},
"V-16879": {
"checkid": "C-17467r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> \"Download signed ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3\n\nCriteria: If the value 1001 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether users may download signed ActiveX controls from a page in the zone. If you enable this policy, users can download signed controls without user intervention. If you select Prompt in the drop-down box, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded. If you disable the policy setting, signed controls cannot be downloaded. If you do not configure this policy setting, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded.",
"fixid": "F-16726r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> \"Download signed ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3\n\nCriteria: Set the value 1001 to REG_DWORD = 3.\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-16879",
"ruleID": "SV-17879r1_rule",
"severity": "medium",
"title": "The Download signed ActiveX controls property is not set properly for the Lockdown Zone.",
"version": "DTBI025"
},
"V-17296": {
"checkid": "C-17941r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Prevent performance of First Run Customize settings\" will be set to \u201cEnabled\u201d and \"Go directly to home page\" selected.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: If the value DisableFirstRunCustomize is REG_DWORD = 1, this is not a finding.\n",
"description": "This policy setting prevents performance of the First Run Customize settings ability and controls what the user will see when they launch Internet Explorer for the first time after installation of Internet Explorer.\nIf you enable this policy setting, users must make one of two choices:\n1: Skip Customize Settings, and go directly to the user\u2019s home page.\n2: Skip Customize Settings, and go directly to the \"Welcome to Internet Explorer\" Web page.\nIf you disable or do not configure this policy setting, users go through the regular first run process.\n",
"fixid": "F-17208r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Prevent performance of First Run Customize settings\" will be set to \u201cEnabled\u201d and \"Go directly to home page\" selected.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\n\nCriteria: Set the value DisableFirstRunCustomize is REG_DWORD = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-17296",
"ruleID": "SV-18332r1_rule",
"severity": "medium",
"title": "Prevent performance of First Run Customize settings is not enabled.",
"version": "DTBI010"
},
"V-21887": {
"checkid": "C-14512r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable \"Configuring History\" \" will be set to \u201cEnabled\u201d and \"40\" entered in 'Days to keep pages in History'.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: If the value History is REG_DWORD = 1, this is not a finding.\n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Url History\n\nCriteria: If the value DaysToKeep is REG_DWORD = 40 (decimal), this is not a finding.\n",
"description": "This setting specifies the number of days that Internet Explorer keeps track of the pages viewed in the History List. The delete Browsing History option can be accessed using Tools, Internet Options and General tab. It is also available as Delete History directly under tools, Internet options, Delete Browsing History in Internet Explorer 7. If you enable this policy setting, a user cannot set the number of days that Internet Explorer keeps track of the pages viewed in the History List. You must specify the number of days that Internet Explorer keeps track of the pages viewed in the History List. Users will not be able to delete browsing history. If you disable or do not configure this policy setting, a user can set the number of days that Internet Explorer keeps track of the pages viewed in the History List and has the freedom to Delete Browsing History.",
"fixid": "F-15120r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> \"Disable \"Configuring History\" \" will be set to \u201cEnabled\u201d and \"40\" entered in 'Days to keep pages in History'.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel\n\nCriteria: Set the value History to REG_DWORD = 1.\n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Url History\n\nCriteria: Set the value DaysToKeep to REG_DWORD = 40 (decimal).\n\n\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-21887",
"ruleID": "SV-24724r1_rule",
"severity": "medium",
"title": "Disable Configuring History - Histroy setting is not set to 40 days.",
"version": "DTBI300"
},
"V-22171": {
"checkid": "C-42151r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> \u201cInternet Explorer Processes\u201d will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_ACTIVEXINSTALL \n\nCriteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.\n",
"description": "This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes. If you do not configure this policy setting, the user\u2019s preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes.",
"fixid": "F-38103r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> \u201cInternet Explorer Processes\u201d will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_ACTIVEXINSTALL \nCriteria: Set the value (Reserved) to REG_SZ = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-22171",
"ruleID": "SV-44647r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes Restrict ActiveX Install (Reserved) property is properly set.",
"version": "DTBI900"
},
"V-22634": {
"checkid": "C-42272r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone \u201cAllow status bar updates via script\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: If the value 2103 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether script is allowed to update the status bar within the zone.",
"fixid": "F-38217r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone \u201cAllow status bar updates via script\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: Set the value 2103 to REG_DWORD = 3.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-22634",
"ruleID": "SV-44766r1_rule",
"severity": "medium",
"title": "Allow status bar updates via script (Internet Zone) property is properly set.",
"version": "DTBI910"
},
"V-22635": {
"checkid": "C-42274r3_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone \u201cRun .NET Framework-reliant components not signed with Authenticode\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: If the value 2004 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link.",
"fixid": "F-38219r3_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone \u201cRun .NET Framework-reliant components not signed with Authenticode\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: Set the value 2004 to REG_DWORD = 3.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-22635",
"ruleID": "SV-44768r1_rule",
"severity": "medium",
"title": "Run .NET Framework-reliant components not signed with Authenticode (Internet Zone) property is properly set.",
"version": "DTBI920"
},
"V-22636": {
"checkid": "C-42346r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone \u201cRun .NET Framework-reliant components signed with Authenticode\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: If the value 2001 is REG_DWORD = 3, this is not a finding.",
"description": "This policy setting allows you to manage whether .NET Framework components that are signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link.",
"fixid": "F-38337r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone \u201cRun .NET Framework-reliant components signed with Authenticode\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: Set the value 2001 to REG_DWORD = 3.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-22636",
"ruleID": "SV-44904r1_rule",
"severity": "medium",
"title": "Run .NET Framework-reliant components signed with Authenticode (Internet Zone) property is properly set.",
"version": "DTBI930"
},
"V-22637": {
"checkid": "C-42275r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone \u201cAllow Scriptlets\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: If the value 1209 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether scriptlets can be allowed.",
"fixid": "F-38220r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone \u201cAllow Scriptlets\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: Set the value 1209 to REG_DWORD = 3.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-22637",
"ruleID": "SV-44769r1_rule",
"severity": "medium",
"title": "Allow Scriptlets (Restricted Sites Zone) property is properly set.",
"version": "DTBI940"
},
"V-22638": {
"checkid": "C-42276r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone \u201cAllow status bar updates via script\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: If the value 2103 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether script is allowed to update the status bar within the zone.",
"fixid": "F-38221r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone \u201cAllow status bar updates via script\u201d will be set to \u201cEnabled\u201d and \u201cDisable\u201d selected from the drop-down box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: Set the value 2103 to REG_DWORD = 3.\n ",
"iacontrols": [
"ECSC-1"
],
"id": "V-22638",
"ruleID": "SV-44770r1_rule",
"severity": "medium",
"title": "Allow status bar updates via script (Restricted Sites Zone) property is properly set.",
"version": "DTBI950"
},
"V-22687": {
"checkid": "C-42152r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> \u201cInternet Explorer Processes\u201d will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_ACTIVEXINSTALL \n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.\n",
"description": "This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes. If you do not configure this policy setting, the user\u2019s preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes.",
"fixid": "F-38104r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> \u201cInternet Explorer Processes\u201d will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_ACTIVEXINSTALL \n\nCriteria: Set the value explorer.exe to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-22687",
"ruleID": "SV-44648r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes Restrict ActiveX Install (Explorer) property is properly set.",
"version": "DTBI1010"
},
"V-22688": {
"checkid": "C-42153r3_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> \u201cInternet Explorer Processes\u201d will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_ACTIVEXINSTALL \n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.\n",
"description": "This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes. If you do not configure this policy setting, the user\u2019s preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes.",
"fixid": "F-38105r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> \u201cInternet Explorer Processes\u201d will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_RESTRICT_ACTIVEXINSTALL \n\nCriteria: Set the value iexplore.exe to REG_SZ = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-22688",
"ruleID": "SV-44649r1_rule",
"severity": "medium",
"title": "Internet Explorer Processes Restrict ActiveX Install (IExplorer) property is properly set.",
"version": "DTBI1020"
},
"V-30777": {
"checkid": "C-42318r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel-> Advanced Page-> \"Automatically check for Internet Explorer updates\" will be set to \u201cDisabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main \n\nCriteria: If the value NoUpdateCheck is REG_DWORD = 1, this is not a finding.\n",
"description": "This policy setting allows you to manage whether Internet Explorer checks the Internet for newer versions. When Internet Explorer is set to do this, the checks occur approximately every 30 days, and users are prompted to install new versions as they become available. If you enable this policy setting, Internet Explorer checks the Internet for a new version approximately every 30 days and prompts the user to download new versions when they are available. Newer versions might not comply with the Internet Explorer version requirements of the organization. ",
"fixid": "F-38289r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel-> Advanced Page-> \"Automatically check for Internet Explorer updates\" will be set to \u201cDisabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main \n\nCriteria: If the value NoUpdateCheck is REG_DWORD = 1, this is not a finding.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-30777",
"ruleID": "SV-44836r1_rule",
"severity": "medium",
"title": "Automatic checking for Internet Explorer updates is not disabled.",
"version": "DTBI775"
},
"V-30779": {
"checkid": "C-42314r3_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Information Bar-> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_SECURITYBAND \n\nCriteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.",
"description": "This policy setting allows you to manage whether the Information bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Information bar is displayed for Internet Explorer processes. If you enable this policy setting, the Information bar will be displayed for Internet Explorer Processes. If you disable this policy setting, the Information n bar will not be displayed for Internet Explorer processes. If you do not configure this policy setting, the Information bar will be displayed for Internet Explorer Processes.",
"fixid": "F-38282r3_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Information Bar-> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_SECURITYBAND \n\nCriteria: Set the value (Reserved) to REG_SZ = 1.",
"iacontrols": [
"ECSC-1"
],
"id": "V-30779",
"ruleID": "SV-44845r2_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Information bars are enforced (Reserved).",
"version": "DTBI815"
},
"V-30780": {
"checkid": "C-42348r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Information Bar-> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_SECURITYBAND \n\nCriteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.\n",
"description": "This policy setting allows you to manage whether the Information bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Information bar is displayed for Internet Explorer processes. If you enable this policy setting, the Information bar will be displayed for Internet Explorer Processes. If you disable this policy setting, the Information bar will not be displayed for Internet Explorer processes. If you do not configure this policy setting, the Information bar will be displayed for Internet Explorer Processes",
"fixid": "F-34629r1_fix",
"fixtext": "Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> \"Internet Explorer Processes\" to \u201cEnabled\u201d.",
"iacontrols": [
"ECSC-1"
],
"id": "V-30780",
"ruleID": "SV-44907r2_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Information bars is not enforced (Explorer).",
"version": "DTBI825"
},
"V-30781": {
"checkid": "C-42351r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Information Bar-> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_SECURITYBAND \n\nCriteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.\n",
"description": "This policy setting allows you to manage whether the Information bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Information bar is displayed for Internet Explorer processes. If you enable this policy setting, the Information bar will be displayed for Internet Explorer processes. If you disable this policy setting, the Information bar will not be displayed for Internet Explorer processes. If you do not configure this policy setting, the Information bar will be displayed for Internet Explorer processes.",
"fixid": "F-38342r2_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Information Bar-> \"Internet Explorer Processes\" will be set to \u201cEnabled\u201d. \n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\nHKLM\\Software\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\FEATURE_SECURITYBAND \n\nCriteria: Set the value iexplore.exe to REG_SZ = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-30781",
"ruleID": "SV-44909r2_rule",
"severity": "medium",
"title": "Internet Explorer Processes for Information bars is not enforced (IExplore).",
"version": "DTBI835"
},
"V-32808": {
"checkid": "C-41149r3_chk",
"checktext": "Procedure: Open Internet Explorer. From the menu bar select Tools. From the Tools dropdown menu, select the Internet Options. From the Internet Options window, select the \"Advanced\" tab from the Advanced tab window, scroll down to the Security category, verify the \"check for publishers certificate revocation\" box is selected.\n \nProcedure: Use the Windows Registry Editor to navigate to the following key:\n \nHKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\WinTrust\\Trust Providers\\Software Publishing\n\nCriteria: If the value State is REG_DWORD = 65536 (decimal), this is not a finding.\n",
"description": "Check for publisher's certificate revocation options should be enforced to ensure all PKI signed objects are validated.",
"fixid": "F-36697r4_fix",
"fixtext": "In the Internet Explorer Options, on the \"Advanced\" tab, scroll down to Security category, and select the \"Check for publisher's certificate revocation\" box.\n\nNOTE: Manual entry for the value \"State\", set to REG_DWORD = 65536, may first be required.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-32808",
"ruleID": "SV-43161r1_rule",
"severity": "medium",
"title": "Check for publishers certificate revocation must be enforced.",
"version": "DTBI018 "
},
"V-3427": {
"checkid": "C-1745r1_chk",
"checktext": "If the following registry value doesn\u2019t exist or is not configured as specified this is a finding:\n\nRegistry Hive: HKEY_LOCAL_MACHINE\nSubkey: \\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\\n\nValue Name:\t Security_HKLM_only\n\nType: REG_DWORD\nValue: 1\n",
"description": "This setting enforces consistent security zone settings to all users of the computer. Security Zones control browser behavior at various web sites and it is desirable to maintain a consistent policy for all users of a machine.",
"fixid": "F-5909r1_fix",
"fixtext": "Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer \u201cSecurity Zones: Use only machine settings\u201d to \u201cEnabled\u201d. ",
"iacontrols": [
"ECSC-1"
],
"id": "V-3427",
"ruleID": "SV-28784r1_rule",
"severity": "medium",
"title": "Internet Explorer is not configured to require consistent security zone settings to all users.",
"version": "DTBI320"
},
"V-3428": {
"checkid": "C-1746r1_chk",
"checktext": "If the following registry value doesn\u2019t exist or is not configured as specified, this is a finding:\n\nRegistry Hive: HKEY_LOCAL_MACHINE\nSubkey: \\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\\n\nValue Name: Security_Options_Edit\n\nType: REG_DWORD\nValue: 1\n",
"description": "This setting prevents users from changing the Internet Explorer policies on the machine. Policy changes should be made by Administrators only, so this setting should be Enabled.",
"fixid": "F-5910r1_fix",
"fixtext": "Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer \u201cSecurity Zones: Do Not Allow Users to Change Policies\u201d to \u201cEnabled\u201d.",
"iacontrols": [
"ECSC-1"
],
"id": "V-3428",
"ruleID": "SV-28782r1_rule",
"severity": "medium",
"title": "Internet Explorer is configured to Allow Users to Change Policies.",
"version": "DTBI319"
},
"V-3429": {
"checkid": "C-1748r1_chk",
"checktext": "If the following registry value doesn\u2019t exist or is not configured as specified, this is a finding:\n\nRegistry Hive: HKEY_LOCAL_MACHINE\nSubkey: \\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\\n\nValue Name:\t Security_Zones_Map_Edit\n\nType: REG_DWORD\nValue: 1\n",
"description": "This setting prevents users from adding sites to various security zones. Users should not be able to add sites to different zones, as this could allow them to bypass security controls of the system.",
"fixid": "F-5911r1_fix",
"fixtext": "Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer \u201cSecurity Zones: Do Not Allow Users to Add/Delete Sites\u201d to \u201cEnabled\u201d.",
"iacontrols": [
"ECSC-1"
],
"id": "V-3429",
"ruleID": "SV-28780r1_rule",
"severity": "medium",
"title": "Internet Explorer is configured to Allow Users to Add/Delete Sites.",
"version": "DTBI318"
},
"V-3430": {
"checkid": "C-1749r1_chk",
"checktext": "Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer \u201cMake proxy settings per-machine (rather than per user)\u201d to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\\n\nCriteria: If the value ProxySettingsPerUser is REG_DWORD = 1, this is not a finding.\n",
"description": "This setting controls whether or not the Internet Explorer proxy settings are configured on a per-user or per-machine basis.",
"fixid": "F-5912r1_fix",
"fixtext": "Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer \u201cMake proxy settings per-machine (rather than per user)\u201d to \u201cDisabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\\n\nCriteria: Set the value ProxySettingsPerUser to REG_DWORD = 1.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-3430",
"ruleID": "SV-3430r1_rule",
"severity": "low",
"title": "Internet Explorer is not configured to disable making Proxy Settings Per Machine.",
"version": "DTBI367"
},
"V-6228": {
"checkid": "C-170r4_chk",
"checktext": "The policy for User Configuration -> Policies -> Administrative Templates -> Windows Components -> Internet Explorer \"Disable changing home page settings\" must be \"Enable\" and specify the URL for the home page.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: HKCU\\Software\\Microsoft\\Internet Explorer\\Main\n\nCriteria: If the value Start Page is about:blank or a trusted site this is not a finding. \n",
"description": "By setting this parameter appropriately, a malicious web site will not be automatically loaded into a browser which may contain mobile code.",
"fixid": "F-131r3_fix",
"fixtext": "Set the policy for User Configuration -> Policies -> Administrative Templates -> Windows Components -> Internet Explorer \"Disable changing home page settings\" to \"Enable\" and specify the URL for the home page.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6228",
"ruleID": "SV-72161r2_rule",
"severity": "medium",
"title": "The IE home page is not set to blank or a trusted site.",
"version": "DTBI001"
},
"V-6238": {
"checkid": "C-41145r11_chk",
"checktext": "Open Internet Explorer. From the menu bar, select \"Tools\". From the \"Tools\" drop-down menu, select \"Internet Options\". \nFrom the \"Internet Options\" window, select the \"Advanced\" tab, from the \"Advanced\" tab window scroll down to the \n\"Security\" category. Verify a checkmark is placed in 'Use TLS 1.0' or higher check boxes. Verify there is not a check \nplaced in the check box for 'Use SSL 2.0' or 'Use SSL 3.0'. If 'Use SSL 2.0' or 'Use SSL 3.0' is checked, then this \nis a finding. \n1) The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet \nExplorer-> Internet Control Panel-> Advanced Page-> 'Turn off Encryption Support' must be 'Enabled' and ensure the \noption selected is 'Use TLS 1.0' or higher' from the drop-down box. If the selected options contain 'SSL 2.0' \nor 'SSL 3.0', then this is a finding.\n2) The policy value for Computer Configuration -> Administrative Templates -> Internet Explorer -> Security Features -> 'Allow fallback to SSL 3.0 (Internet Explorer)' must be selected, and 'No Sites' selected from the drop-down box.",
"description": "This parameter ensures only DoD-approved ciphers and algorithms are enabled for use by the web browser. TLS is a protocol for protecting communication between the browser and the target server. When the browser attempts to set up a protected communication with the target server, the browser and server negotiate which protocol and version to use. The browser and server attempt to match each other\u2019s list of supported protocols and versions and pick the most preferred match. ",
"fixid": "F-36693r10_fix",
"fixtext": "Open Internet Explorer. From the menu bar, select \"Tools\". From the \"Tools\" drop-down menu, select \"Internet Options\". \nFrom the \"Internet Options\" window, select the \"Advanced\" tab, from the \"Advanced\" tab window scroll down to the \n\"Security\" category. Place a checkmark in 'Use TLS 1.0' or higher check boxes. Uncheck 'Use SSL 2.0' and 'Use SSL \n3.0' options. \nSet the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet \nExplorer-> Internet Control Panel-> Advanced Page-> 'Turn off Encryption Support' to 'Enabled', and select 'Use TLS \n1.0' or higher from the drop-down box. Ensure the options do not include 'SSL 2.0' or 'SSL 3.0'.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6238",
"ruleID": "SV-43157r4_rule",
"severity": "medium",
"title": "The IE TLS parameter must be set correctly.",
"version": "DTBI014"
},
"V-6239": {
"checkid": "C-41142r2_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page \"Turn on Warn about Certificate Address Mismatch\" must be \"Enabled\". \n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings \n\nCriteria: If the value WarnOnBadCertRecving is REG_DWORD = 1, this is not a finding.\n",
"description": "This parameter warns users if the certificate being presented by the web site is invalid. Since server certificates are used to validate the identity of the web server it is critical to warn the user of a potential issue with the certificate being presented by the web server. This setting aids to prevent spoofing attacks.",
"fixid": "F-36690r2_fix",
"fixtext": "Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page \"Turn on Warn about Certificate Address Mismatch\" to \"Enabled\".",
"iacontrols": [
"ECSC-1"
],
"id": "V-6239",
"ruleID": "SV-43154r1_rule",
"severity": "medium",
"title": "The IE warning about certificate address mismatch must be enforced.",
"version": "DTBI015"
},
"V-6243": {
"checkid": "C-14666r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Download signed ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1001 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether users may download signed ActiveX controls from a page in the zone. If you enable this policy, users can download signed controls without user intervention. If you select Prompt in the drop-down box, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded. If you disable the policy setting, signed controls cannot be downloaded. If you do not configure this policy setting, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded.",
"fixid": "F-15227r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Download signed ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1001 to REG_DWORD = 3.\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-6243",
"ruleID": "SV-16439r1_rule",
"severity": "medium",
"title": "Download signed ActiveX controls for internet zone is not disabled.",
"version": "DTBI022"
},
"V-6244": {
"checkid": "C-14671r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Download unsigned ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1004 is REG_DWORD = 3, this is not a finding.\n",
"description": "Active X controls can contain potentially malicious code and must only be allowed to be downloaded from trusted sites and they must be digitally signed.\n",
"fixid": "F-15229r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Download unsigned ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1004 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6244",
"ruleID": "SV-16441r1_rule",
"severity": "medium",
"title": "Download unsigned ActiveX controls for internet zone is not disabled.",
"version": "DTBI023"
},
"V-6245": {
"checkid": "C-14676r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Initialize and script ActiveX controls not marked as safe\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1201 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage ActiveX controls not marked as safe.\nIf you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option.\nIf you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted.\n",
"fixid": "F-15231r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Initialize and script ActiveX controls not marked as safe\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1201 to REG_DWORD = 3.\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-6245",
"ruleID": "SV-16443r1_rule",
"severity": "medium",
"title": "Initialize and script ActiveX controls not marked as safe for internet zone is not disabled.",
"version": "DTBI024"
},
"V-6248": {
"checkid": "C-14648r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow font downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1604 is REG_DWORD = 3, this is not a finding.\n",
"description": "Download of fonts can sometimes contain malicious code. ",
"fixid": "F-15223r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow font downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1604 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6248",
"ruleID": "SV-16435r1_rule",
"severity": "medium",
"title": "Allow font downloads for internet zone is not disabled.",
"version": "DTBI030"
},
"V-6249": {
"checkid": "C-14686r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "Java must have level of protections based upon the site being browsed.",
"fixid": "F-15235r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6249",
"ruleID": "SV-16447r1_rule",
"severity": "medium",
"title": "Java permissions for internet zone are not disabled.",
"version": "DTBI031"
},
"V-6250": {
"checkid": "C-14469r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Access data sources across domains\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1406 is REG_DWORD = 3, this is not a finding.",
"description": "This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone.",
"fixid": "F-15112r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Access data sources across domains\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria:Set the value 1406 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6250",
"ruleID": "SV-16283r1_rule",
"severity": "medium",
"title": "Access data sources across domains are not disabled.",
"version": "DTBI032"
},
"V-6253": {
"checkid": "C-14646r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow drag and drop or copy and paste files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: If the value for 1802 is REG_DWORD = 3, this is not a finding. \n",
"description": "Drag and Drop of files must have level of protection based upon the site being accessed.",
"fixid": "F-15221r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow drag and drop or copy and paste files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key:\n HKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: Set the value 1802 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6253",
"ruleID": "SV-16433r1_rule",
"severity": "medium",
"title": "The Allow drag and drop or copy and paste files for internet zone are not disabled.",
"version": "DTBI036"
},
"V-6254": {
"checkid": "C-14650r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow installation of desktop items\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1800 is REG_DWORD = 3, this is not a finding.\n",
"description": "Installation of items must have level of protection based upon the site being accessed.",
"fixid": "F-15225r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow installation of desktop items\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1800 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6254",
"ruleID": "SV-16437r1_rule",
"severity": "medium",
"title": "Allow installation of desktop items for internet zone is not disabled.",
"version": "DTBI037"
},
"V-6255": {
"checkid": "C-14688r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Launching applications and files in an IFRAME\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1804 is REG_DWORD = 3, this is not a finding.\n",
"description": "Launching of programs in IFRAME must have level of protection based upon the site being accessed.",
"fixid": "F-15237r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Launching applications and files in an IFRAME\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1804 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6255",
"ruleID": "SV-16449r1_rule",
"severity": "medium",
"title": "Launching applications and files in an IFRAME for internet zone is not disabled.",
"version": "DTBI038"
},
"V-6256": {
"checkid": "C-14692r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Navigate sub-frames across different domains\" will be set to \u201cEnabled\" and then select \"Disabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1607 is REG_DWORD = 3, this is not a finding.\n",
"description": "Frames that navigate across different domains are a security concern because the user may think they are accessing pages on one site while they are actually accessing pages on another site.",
"fixid": "F-15241r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Navigate sub-frames across different domains\" will be set to \"Enabled\u201c and then select \"Disabled\u201d.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1607 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6256",
"ruleID": "SV-16453r1_rule",
"severity": "medium",
"title": "Navigate sub-frames across different domains for internet zone are not disabled.",
"version": "DTBI039"
},
"V-6257": {
"checkid": "C-14694r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Software channel permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1E05 is REG_DWORD = 65536, (Decimal), this is not a finding.\n",
"description": "Software Channel permissions must have level of protection based upon the site being accessed.",
"fixid": "F-5716r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Software channel permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3 \n\nCriteria: Set the value 1E05 to REG_DWORD = 65536, (Decimal).",
"iacontrols": [
"DCMC-1"
],
"id": "V-6257",
"ruleID": "SV-16455r1_rule",
"severity": "medium",
"title": "Software channel permissions for internet zone are not disabled.",
"version": "DTBI040"
},
"V-6259": {
"checkid": "C-14696r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Userdata persistence\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1606 is REG_DWORD = 3, this is not a finding.\n",
"description": "Userdata persistence must have level of protection based upon the site being accessed.",
"fixid": "F-15244r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Userdata persistence\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1606 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6259",
"ruleID": "SV-16457r1_rule",
"severity": "medium",
"title": "Userdata persistence for internet zone is not disabled.",
"version": "DTBI042"
},
"V-6260": {
"checkid": "C-14644r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow cut, copy or paste operations from the clipboard via script\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1407 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether scripts can perform a clipboard operation (for example, cut, copy, and paste) in a specified region.\nIf you enable this policy setting, a script can perform a clipboard operation.\nIf you select Prompt in the drop-down box, users are queried as to whether to perform clipboard operations. If you disable this policy setting, a script cannot perform a clipboard operation. If you do not configure this policy setting, a script can perform a clipboard operation.\n",
"fixid": "F-15219r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Allow cut, copy or paste operations from the clipboard via script\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1407 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6260",
"ruleID": "SV-16431r1_rule",
"severity": "medium",
"title": "Allow cut, copy or paste operations from the clipboard via script are not disabled for internet zone.",
"version": "DTBI044"
},
"V-6262": {
"checkid": "C-14690r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Logon options\" will be set to \u201cEnabled\u201d and \"Prompt for user name and password\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: If the value 1A00 is REG_DWORD = 65536 (decimal), this is not a finding.\n",
"description": "Care must be taken with user credentials and how automatic logons are performed and how default Windows credentials are passed to web sites.",
"fixid": "F-15239r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> \"Logon options\" will be set to \u201cEnabled\u201d and \"Prompt for user name and password\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3\n\nCriteria: Set the value 1A00 to REG_DWORD = 65536 (decimal).",
"iacontrols": [
"ECSC-1"
],
"id": "V-6262",
"ruleID": "SV-16451r1_rule",
"severity": "medium",
"title": "Logon options for internet zone are not enabled.",
"version": "DTBI046"
},
"V-6267": {
"checkid": "C-14684r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1\n\nCriteria: If the value 1C00 is REG_DWORD = 65536, (Decimal), this is not a finding.\n",
"description": "Java must have level of protection based upon the site being browsed.\n",
"fixid": "F-15233r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1\n\nCriteria: Set the value 1C00 to REG_DWORD = 65536, (Decimal).",
"iacontrols": [
"DCMC-1"
],
"id": "V-6267",
"ruleID": "SV-16445r1_rule",
"severity": "medium",
"title": "Java permissions for local intranet zone are not disabled.",
"version": "DTBI061"
},
"V-6281": {
"checkid": "C-14685r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2\n\nCriteria: If the value 1C00 is REG_DWORD = 65536, (Decimal), this is not a finding.\n",
"description": "Java must have level of protection based upon the site being browsed.",
"fixid": "F-15234r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2\n\nCriteria: Set the value 1C00 to REG_DWORD = 65536, (Decimal).\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-6281",
"ruleID": "SV-16446r1_rule",
"severity": "medium",
"title": "Java permissions for trusted sites zone are not disabled.",
"version": "DTBI091"
},
"V-6289": {
"checkid": "C-14668r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Download signed ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1001 is REG_DWORD = 3, this is not a finding.\n",
"description": "ActiveX controls can contain potentially malicious code and must only be allowed to be downloaded from trusted sites.",
"fixid": "F-15228r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Download signed ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1001 to REG_DWORD = 3.\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-6289",
"ruleID": "SV-16440r1_rule",
"severity": "medium",
"title": "Download signed ActiveX controls for restricted sites zone is not disabled.",
"version": "DTBI112"
},
"V-6290": {
"checkid": "C-14673r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Download unsigned ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1004 is REG_DWORD = 3, this is not a finding.\n",
"description": "ActiveX controls can contain potentially malicious code and must only be allowed to be downloaded from trusted sites and they must be digitally signed.",
"fixid": "F-15230r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Download unsigned ActiveX controls\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1004 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6290",
"ruleID": "SV-16442r1_rule",
"severity": "medium",
"title": "Download unsigned ActiveX controls for restricted sites zone is not disabled.",
"version": "DTBI113"
},
"V-6291": {
"checkid": "C-14680r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Initialize and script ActiveX controls not marked as safe\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedures: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1201 is REG_DWORD = 3, this is not a finding.\n",
"description": "ActiveX controls that are not marked safe for scripting should not be executed. Although this is not a \ncomplete security measure for a control to be marked safe for scripting, if a control is not marked \nsafe, it should not be initialized and executed.",
"fixid": "F-15232r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Initialize and script ActiveX controls not marked as safe\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1201 to REG_DWORD = 3.\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-6291",
"ruleID": "SV-16444r1_rule",
"severity": "medium",
"title": "Initialize and script ActiveX controls not marked as safe for restricted sites zone is not disabled.",
"version": "DTBI114"
},
"V-6292": {
"checkid": "C-14703r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Run ActiveX controls and plugins\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1200 is REG_DWORD = 3, this is not a finding.\n",
"description": "ActiveX controls that are not marked safe for scripting should not be executed. Although this is not a \ncomplete security measure for a control to be marked safe for scripting, if a control is not marked \nsafe, it should not be initialized and executed.",
"fixid": "F-15251r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Run ActiveX controls and plugins\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1200 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6292",
"ruleID": "SV-16464r1_rule",
"severity": "medium",
"title": "Run ActiveX controls and plugins are not disabled..",
"version": "DTBI115"
},
"V-6293": {
"checkid": "C-14704r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Script ActiveX controls marked safe for scripting\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1405 is REG_DWORD = 3, this is not a finding.\n",
"description": "ActiveX controls that are not marked safe for scripting should not be executed. Although this is not a \ncomplete security measure for a control to be marked safe for scripting, if a control is not marked \nsafe, it should not be initialized and executed.",
"fixid": "F-15252r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Script ActiveX controls marked safe for scripting\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1405 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6293",
"ruleID": "SV-16465r1_rule",
"severity": "medium",
"title": "Script ActiveX controls marked safe for scripting is not disabled.",
"version": "DTBI116"
},
"V-6294": {
"checkid": "C-14701r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow file downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1803 is REG_DWORD = 3, this is not a finding.\n",
"description": "Files should not be able to be downloaded from sites that are considered restricted.",
"fixid": "F-15249r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow file downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1803 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6294",
"ruleID": "SV-16462r1_rule",
"severity": "medium",
"title": "Allow file downloads are not disabled.",
"version": "DTBI119"
},
"V-6295": {
"checkid": "C-14649r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow font downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1604 is REG_DWORD = 3, this is not a finding.\n",
"description": "Download of fonts can sometimes contain malicious code. Files should not be downloaded from restricted sites.",
"fixid": "F-15224r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow font downloads\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1604 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6295",
"ruleID": "SV-16436r1_rule",
"severity": "medium",
"title": "Allow font downloads for restricted sites zone is not disabled.",
"version": "DTBI120"
},
"V-6297": {
"checkid": "C-14643r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Access data sources across domains\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1406 is REG_DWORD = 3, this is not a finding.\n",
"description": "This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone.",
"fixid": "F-15218r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Access data sources across domains\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1406 to REG_DWORD = 3.\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-6297",
"ruleID": "SV-16430r1_rule",
"severity": "medium",
"title": "Access data sources across domains restricted sites zones are not disabled.",
"version": "DTBI122"
},
"V-6298": {
"checkid": "C-14702r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow META REFRESH\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1608 is REG_DWORD = 3, this is not a finding.\n",
"description": "Allow META REFRESH must have level of protection based upon the site being browsed.",
"fixid": "F-15250r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow META REFRESH\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1608 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6298",
"ruleID": "SV-16463r1_rule",
"severity": "medium",
"title": "Allow META REFRESH is not disabled.",
"version": "DTBI123"
},
"V-6301": {
"checkid": "C-14647r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow drag and drop or copy and paste files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1802 is REG_DWORD = 3, this is not a finding.\n",
"description": "Drag and Drop of files must have level of protection based upon the site being accessed.",
"fixid": "F-15222r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow drag and drop or copy and paste files\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1802 to REG_DWORD = 3.\n",
"iacontrols": [
"ECSC-1"
],
"id": "V-6301",
"ruleID": "SV-16434r1_rule",
"severity": "medium",
"title": "Allow drag and drop or copy and paste files for restricted sites zone are not disabled.",
"version": "DTBI126"
},
"V-6302": {
"checkid": "C-14653r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow installation of desktop items\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1800 is REG_DWORD = 3, this is not a finding.\n",
"description": "Installation of items must have level of protection based upon the site being accessed. ",
"fixid": "F-15226r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow installation of desktop items\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1800 to REG_DWORD = 3.\n",
"iacontrols": [
"DCMC-1"
],
"id": "V-6302",
"ruleID": "SV-16438r1_rule",
"severity": "medium",
"title": "Allow installation of desktop items for restricted sites zone is not disabled.",
"version": "DTBI127"
},
"V-6303": {
"checkid": "C-14689r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Launching applications and files in an IFRAME\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: If the value 1804 is REG_DWORD = 3, this is not a finding.\n\n",
"description": "Launching of programs in IFRAME must have level of protection based upon the site being accessed.",
"fixid": "F-15238r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Launching applications and files in an IFRAME\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4 \n\nCriteria: Set the value 1804 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6303",
"ruleID": "SV-16450r1_rule",
"severity": "medium",
"title": "Launching applications and files in an IFRAME is not disabled.",
"version": "DTBI128"
},
"V-6304": {
"checkid": "C-14693r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Navigate sub-frames across different domains\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1607 is REG_DWORD = 3, this is not a finding.\n",
"description": "Frames that navigate across different domains are a security concern because the user may think they are accessing pages on one site while they are actually accessing pages on another site.\n",
"fixid": "F-15242r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Navigate sub-frames across different domains\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1607 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6304",
"ruleID": "SV-16454r1_rule",
"severity": "medium",
"title": "Navigate sub-frames across different domains for restricted sites zone are not disabled.",
"version": "DTBI129"
},
"V-6305": {
"checkid": "C-14695r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Software channel permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1E05 is REG_DWORD = 65536 (decimal), this is not a finding.\n",
"description": "Software channel permissions must have level of protection based upon the site being accessed.",
"fixid": "F-15243r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Software channel permissions\" will be set to \u201cEnabled\u201d and \"High Safety\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1E05 to REG_DWORD = 65536 (decimal).",
"iacontrols": [
"DCMC-1"
],
"id": "V-6305",
"ruleID": "SV-16456r1_rule",
"severity": "medium",
"title": "Software channel permissions for restricted sites zone are not disabled.",
"version": "DTBI130"
},
"V-6307": {
"checkid": "C-14697r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Userdata persistence\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1606 is REG_DWORD = 3, this is not a finding.\n\n",
"description": "No perseistant data should exist and be used in the Restricted sites zone. ",
"fixid": "F-15245r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Userdata persistence\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1606 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6307",
"ruleID": "SV-16458r1_rule",
"severity": "medium",
"title": "Userdata persistence for restricted sites zone is not disabled.",
"version": "DTBI132"
},
"V-6308": {
"checkid": "C-14700r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow active scripting\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1400 is REG_DWORD = 3, this is not a finding.\n",
"description": "Active Scripting must have level of protection based upon the site being accessed.",
"fixid": "F-15248r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow active scripting\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1400 to REG_DWORD = 3.",
"iacontrols": [
"DCMC-1"
],
"id": "V-6308",
"ruleID": "SV-16461r1_rule",
"severity": "medium",
"title": "Allow active scripting is not disabled.",
"version": "DTBI133"
},
"V-6309": {
"checkid": "C-14645r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow cut, copy or paste operations from the clipboard via script\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1407 is REG_DWORD = 3, this is not a finding.\n",
"description": "The Allow paste operations via script must have level of protection based upon the site being browsed.",
"fixid": "F-15220r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Allow cut, copy or paste operations from the clipboard via script\" will be set to \u201cEnabled\u201d and \"Disable\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1407 to REG_DWORD = 3.",
"iacontrols": [
"ECSC-1"
],
"id": "V-6309",
"ruleID": "SV-16432r1_rule",
"severity": "medium",
"title": "Allow cut, copy or paste operations from the clipboard via script are not disabled for restricted sites zone.",
"version": "DTBI134"
},
"V-6311": {
"checkid": "C-14691r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Logon options\" will be set to \u201cEnabled\u201d and \"Anonymous logon\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1A00 is REG_DWORD = 196608 (decimal), this is not a finding.\n",
"description": "Care must be taken with user credentials and how automatic logons are performed and how default Windows credentials are passed to web sites.\n",
"fixid": "F-15240r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Logon options\" will be set to \u201cEnabled\u201d and \"Anonymous logon\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following key: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1A00 to REG_DWORD = 196608 (decimal).",
"iacontrols": [
"ECSC-1"
],
"id": "V-6311",
"ruleID": "SV-16452r1_rule",
"severity": "medium",
"title": "Logon options for restricted sites zones are not enabled.",
"version": "DTBI136"
},
"V-64781": {
"checkid": "C-65473r2_chk",
"checktext": "Procedure: Open Internet Explorer >> Select Help >> Select About.\n\nCriteria: If the version number of Internet Explorer is any version of Internet Explorer 7, this is a finding.\n\nAs of 12 January 2016, Internet Explorer 7 is no longer supported. \n",
"description": "Unsupported versions are no longer being evaluated or updated for security related issues.",
"fixid": "F-70713r1_fix",
"fixtext": "Upgrade Internet Explorer to a supported software version. ",
"iacontrols": [
"ECSC-1"
],
"id": "V-64781",
"ruleID": "SV-79271r1_rule",
"severity": "high",
"title": "The installed version of IE must be a supported version.",
"version": "DTBI002 - IE7"
},
"V-7007": {
"checkid": "C-14687r1_chk",
"checktext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.\n",
"description": "Java must have level of protection based upon the site being browsed.",
"fixid": "F-15236r1_fix",
"fixtext": "The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> \"Java permissions\" will be set to \u201cEnabled\u201d and \"Disable Java\" selected from down drop box.\n\nProcedure: Use the Windows Registry Editor to navigate to the following keys: \n\nHKLM\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4\n\nCriteria: Set the value 1C00 to REG_DWORD = 0.",
"iacontrols": [
"DCMC-1"
],
"id": "V-7007",
"ruleID": "SV-16448r1_rule",
"severity": "medium",
"title": "Java permissions for restricted sites zone are not disabled.",
"version": "DTBI121"
}
},
"profiles": {
"MAC-1_Classified": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-1_Classified",
"title": "I - Mission Critical Classified"
},
"MAC-1_Public": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-1_Public",
"title": "I - Mission Critical Public"
},
"MAC-1_Sensitive": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-1_Sensitive",
"title": "I - Mission Critical Sensitive"
},
"MAC-2_Classified": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-2_Classified",
"title": "II - Mission Support Classified"
},
"MAC-2_Public": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-2_Public",
"title": "II - Mission Support Public"
},
"MAC-2_Sensitive": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-2_Sensitive",
"title": "II - Mission Support Sensitive"
},
"MAC-3_Classified": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-3_Classified",
"title": "III - Administrative Classified"
},
"MAC-3_Public": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-3_Public",
"title": "III - Administrative Public"
},
"MAC-3_Sensitive": {
"description": "",
"findings": {
"V-14245": "true",
"V-15490": "true",
"V-15492": "true",
"V-15494": "true",
"V-15495": "true",
"V-15497": "true",
"V-15499": "true",
"V-15500": "true",
"V-15502": "true",
"V-15503": "true",
"V-15504": "true",
"V-15507": "true",
"V-15508": "true",
"V-15509": "true",
"V-15513": "true",
"V-15515": "true",
"V-15516": "true",
"V-15517": "true",
"V-15518": "true",
"V-15519": "true",
"V-15520": "true",
"V-15521": "true",
"V-15522": "true",
"V-15523": "true",
"V-15524": "true",
"V-15525": "true",
"V-15526": "true",
"V-15527": "true",
"V-15528": "true",
"V-15529": "true",
"V-15530": "true",
"V-15533": "true",
"V-15534": "true",
"V-15545": "true",
"V-15546": "true",
"V-15548": "true",
"V-15549": "true",
"V-15550": "true",
"V-15551": "true",
"V-15552": "true",
"V-15556": "true",
"V-15557": "true",
"V-15558": "true",
"V-15559": "true",
"V-15560": "true",
"V-15561": "true",
"V-15562": "true",
"V-15563": "true",
"V-15564": "true",
"V-15565": "true",
"V-15566": "true",
"V-15568": "true",
"V-15569": "true",
"V-15570": "true",
"V-15571": "true",
"V-15572": "true",
"V-15574": "true",
"V-15575": "true",
"V-15579": "true",
"V-15580": "true",
"V-15581": "true",
"V-15582": "true",
"V-15603": "true",
"V-15604": "true",
"V-16879": "true",
"V-17296": "true",
"V-21887": "true",
"V-22171": "true",
"V-22634": "true",
"V-22635": "true",
"V-22636": "true",
"V-22637": "true",
"V-22638": "true",
"V-22687": "true",
"V-22688": "true",
"V-30777": "true",
"V-30779": "true",
"V-30780": "true",
"V-30781": "true",
"V-32808": "true",
"V-3427": "true",
"V-3428": "true",
"V-3429": "true",
"V-3430": "true",
"V-6228": "true",
"V-6238": "true",
"V-6239": "true",
"V-6243": "true",
"V-6244": "true",
"V-6245": "true",
"V-6248": "true",
"V-6249": "true",
"V-6250": "true",
"V-6253": "true",
"V-6254": "true",
"V-6255": "true",
"V-6256": "true",
"V-6257": "true",
"V-6259": "true",
"V-6260": "true",
"V-6262": "true",
"V-6267": "true",
"V-6281": "true",
"V-6289": "true",
"V-6290": "true",
"V-6291": "true",
"V-6292": "true",
"V-6293": "true",
"V-6294": "true",
"V-6295": "true",
"V-6297": "true",
"V-6298": "true",
"V-6301": "true",
"V-6302": "true",
"V-6303": "true",
"V-6304": "true",
"V-6305": "true",
"V-6307": "true",
"V-6308": "true",
"V-6309": "true",
"V-6311": "true",
"V-64781": "true",
"V-7007": "true"
},
"id": "MAC-3_Sensitive",
"title": "III - Administrative Sensitive"
}
},
"slug": "microsoft_ie_version_7",
"title": "Microsoft IE Version 7 ",
"version": "None"
}
}