UCF STIG Viewer Logo

Microsoft Project 2010 STIG


Overview

Date Finding Count (12)
2018-04-04 CAT I (High): 0 CAT II (Med): 12 CAT III (Low): 0
STIG Description
Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Classified)

Finding ID Severity Title
V-26691 Medium Untrusted intranet zone access to Project servers must not be allowed.
V-17184 Medium Links that invoke instances of IE from within an Office product must be blocked.
V-17183 Medium Navigation to URL's embedded in Office products must be blocked.
V-17173 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-17174 Medium Enabling IE Bind to Object functionality must be present.
V-17175 Medium Saved from URL mark to assure Internet zone processing must be enforced.
V-26588 Medium Scripted Window Security must be enforced.
V-26590 Medium Data Execution Prevention must be enforced.
V-26587 Medium File Downloads must be configured for proper restrictions.
V-26586 Medium ActiveX Installs must be configured for proper restriction.
V-26585 Medium Protection from zone elevation must be enforced.
V-26584 Medium Add-on Management functionality must be allowed.