UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

MS SharePoint Designer 2013 Security Technical Implementation Guide


Overview

Date Finding Count (10)
2018-04-02 CAT I (High): 0 CAT II (Med): 10 CAT III (Low): 0
STIG Description
The Microsoft SharePointDesigner 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-40745 Medium The Internet Explorer Bind to Object functionality must be enabled.
V-40744 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-40747 Medium Navigation to URLs embedded in Office products must be blocked.
V-40746 Medium The Saved from URL mark must be selected to enforce Internet zone processing
V-40752 Medium Protection from zone elevation must be enforced.
V-40755 Medium ActiveX installs must be configured for proper restrictions.
V-40749 Medium Add-on Management functionality must be allowed.
V-40750 Medium Links that invoke instances of IE from within an Office product must be blocked.
V-40748 Medium Scripted Window Security must be enforced.
V-40751 Medium File downloads must be configured for proper restrictions.