Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-6298 | DTBI123 | SV-45324r1_rule | DCMC-1 | Medium |
Description |
---|
It is possible that users will unknowingly be redirected to a site hosting malicious content. "Allow META REFRESH" must have a level of protection based upon the site being browsed. This policy setting allows you to manage whether a user's browser can be redirected to another web page if the author of the web page uses the Meta Refresh setting to redirect browsers to another web page. |
STIG | Date |
---|---|
Microsoft Internet Explorer 10 Security Technical Implementation Guide | 2012-12-21 |
Check Text ( C-42672r1_chk ) |
---|
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow META REFRESH" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1608 is REG_DWORD = 3, this is not a finding. |
Fix Text (F-38720r1_fix) |
---|
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow META REFRESH" to "Enabled", and select "Disable" from the drop-down box. |