Desktop Applications General


Version / Release: V4R3

Published: 2012-02-28

Updated At: 2018-09-23 02:26:05

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements




Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-6428r1_rule DTGW001 MEDIUM An appropriate backup strategy does not exist for the data. Data integrity and availability are key security objectives. Adequate data backup is one strategy that is crucial to meeting these objectives. Although users of desktop applications may not be creating mission critical data, all their data represents a
    SV-6429r1_rule DTGW002 MEDIUM Public instant message clients are installed. Instant Messaging or IM clients provide a way for a user to send a message to one or more other users in real time. Additional capabilities may include file transfer and support for distributed game playing. Communication between clients and associated
    SV-6430r1_rule DTGW003 MEDIUM Peer to Peer clients or utilities are installed. File-sharing utilities and clients can provide the ability to share files with other users (Peer-to-Peer Sharing). This type of utility is a security risk due to the potential risk of loss of sensitive data and the broadcast of the existence of a compute
    SV-7145r1_rule DTGW004 MEDIUM Execution Restricted File Type Properties For certain file types, it is necessary to take steps to ensure that the default method of opening the file does not allow mobile code to be executed. Two techniques to achieve this goal are discussed here—altering the default file type Action and dele
    SV-7146r1_rule DTGW005 MEDIUM Open-restricted File Type Properties For some file types, providing the user an opportunity to cancel the opening of the file provides adequate protection for most environments. Files that are opened with applications that include internal controls on code execution are good candidates for