Google Chrome Current Windows Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +44 −44
Comparison against the immediately-prior release (V1R19). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 44
- V-221558 Medium Firewall traversal from remote host must be disabled.
- V-221559 Medium Site tracking users location must be disabled.
- V-221561 Medium Sites ability to show pop-ups must be disabled.
- V-221562 Medium Extensions installation must be blacklisted by default.
- V-221563 Medium Extensions that are approved for use must be whitelisted.
- V-221564 Medium The default search providers name must be set.
- V-221565 Medium The default search provider URL must be set to perform encrypted searches.
- V-221566 Medium Default search provider must be enabled.
- V-221567 Medium The Password Manager must be disabled.
- V-221568 High The running of outdated plugins must be disabled.
- V-221570 Medium Background processing must be disabled.
- V-221571 Medium Google Data Synchronization must be disabled.
- V-221572 Medium The URL protocol schema javascript must be disabled.
- V-221573 Medium Cloud print sharing must be disabled.
- V-221574 Medium Network prediction must be disabled.
- V-221575 Medium Metrics reporting to Google must be disabled.
- V-221576 Medium Search suggestions must be disabled.
- V-221577 Medium Importing of saved passwords must be disabled.
- V-221578 Medium Incognito mode must be disabled.
- V-221579 Medium Online revocation checks must be done.
- V-221580 Medium Safe Browsing must be enabled,
- V-221581 Medium Browser history must be saved.
- V-221582 Medium Default behavior must block webpages from automatically running plugins.
- V-221583 Medium Session only based cookies must be disabled.
- V-221584 Medium The version of Google Chrome running on the system must be a supported version.
- V-221585 Medium URLs must be whitelisted for plugin use
- V-221586 Medium Deletion of browser history must be disabled.
- V-221587 Medium Prompt for download location must be enabled.
- V-221588 Medium Download restrictions must be configured.
- V-221589 Medium Chrome must be configured to allow only TLS.
- V-221590 Medium Safe Browsing Extended Reporting must be disabled.
- V-221591 Medium WebUSB must be disabled.
- V-221592 Medium Chrome Cleanup must be disabled.
- V-221593 Medium Chrome Cleanup reporting must be disabled.
- V-221594 Medium Google Cast must be disabled.
- V-221595 Medium Autoplay must be disabled.
- V-221596 Medium URLs must be whitelisted for Autoplay use.
- V-221597 Medium Anonymized data collection must be disabled.
- V-221598 Medium Collection of WebRTC event logs must be disabled.
- V-221599 Low Chrome development tools must be disabled.
- V-226401 Medium Guest Mode must be disabled.
- V-226402 Medium AutoFill for credit cards must be disabled.
- V-226403 Medium AutoFill for addresses must be disabled.
- V-226404 Medium Import AutoFill form data must be disabled.
Removed rules 44
- V-102867 Medium Guest Mode must be disabled.
- V-102869 Medium AutoFill for credit cards must be disabled.
- V-102871 Medium AutoFill for addresses must be disabled.
- V-102873 Medium Import AutoFill form data must be disabled.
- V-44711 Medium Firewall traversal from remote host must be disabled.
- V-44719 Medium Sites ability to show pop-ups must be disabled.
- V-44723 Medium Site tracking users location must be disabled.
- V-44727 Medium Extensions installation must be blacklisted by default.
- V-44729 Medium Extensions that are approved for use must be whitelisted.
- V-44733 Medium The default search providers name must be set.
- V-44735 Medium The default search provider URL must be set to perform encrypted searches.
- V-44737 Medium Default search provider must be enabled.
- V-44741 Medium The Password Manager must be disabled.
- V-44745 High The running of outdated plugins must be disabled.
- V-44753 Medium Background processing must be disabled.
- V-44759 Medium Google Data Synchronization must be disabled.
- V-44761 Medium The URL protocol schema javascript must be disabled.
- V-44765 Medium Cloud print sharing must be disabled.
- V-44769 Medium Network prediction must be disabled.
- V-44771 Medium Metrics reporting to Google must be disabled.
- V-44773 Medium Search suggestions must be disabled.
- V-44775 Medium Importing of saved passwords must be disabled.
- V-44777 Medium Incognito mode must be disabled.
- V-44789 Medium Online revocation checks must be done.
- V-44791 Medium Safe Browsing must be enabled,
- V-44793 Medium Browser history must be saved.
- V-44795 Medium Default behavior must block webpages from automatically running plugins.
- V-44799 Medium Session only based cookies must be disabled.
- V-44805 Medium The version of Google Chrome running on the system must be a supported version.
- V-52795 Medium URLs must be whitelisted for plugin use
- V-75165 Medium Deletion of browser history must be disabled.
- V-79929 Medium Prompt for download location must be enabled.
- V-79931 Medium Download restrictions must be configured.
- V-81581 Medium Autoplay must be disabled.
- V-81583 Medium Chrome must be configured to allow only TLS.
- V-81585 Medium Safe Browsing Extended Reporting must be disabled.
- V-81587 Medium WebUSB must be disabled.
- V-81589 Medium URLs must be whitelisted for Autoplay use.
- V-81591 Medium Chrome Cleanup must be disabled.
- V-81593 Medium Chrome Cleanup reporting must be disabled.
- V-81597 Medium Google Cast must be disabled.
- V-91203 Medium Anonymized data collection must be disabled.
- V-91205 Medium Collection of WebRTC event logs must be disabled.
- V-97525 Low Chrome development tools must be disabled.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBC-0001
- Vuln IDs
-
- V-221558
- V-44711
- Rule IDs
-
- SV-221558r508655_rule
- SV-57545
Checks: C-23273r415801_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23262r415802_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Configure remote access options Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0002
- Vuln IDs
-
- V-221559
- V-44723
- Rule IDs
-
- SV-221559r508655_rule
- SV-57557
Checks: C-23274r478199_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding.
Fix: F-23263r478200_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0004
- Vuln IDs
-
- V-221561
- V-44719
- Rule IDs
-
- SV-221561r539433_rule
- SV-57553
Checks: C-23276r539432_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding. Note: If AO Approved exceptions to this rule have been enabled, this is not a finding.
Fix: F-23265r478203_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0005
- Vuln IDs
-
- V-221562
- V-44727
- Rule IDs
-
- SV-221562r508655_rule
- SV-57561
Checks: C-23277r415813_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlacklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlacklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding.
Fix: F-23266r415814_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blacklist Policy State: Enabled Policy Value: *
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBC-0006
- Vuln IDs
-
- V-221563
- V-44729
- Rule IDs
-
- SV-221563r508655_rule
- SV-57563
Checks: C-23278r415816_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallWhitelist is not displayed under the Policy Name column or it is not set to oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator approved extension IDs, then this is a finding. Windows method: 1. Start regedit 2. Navigate to the key HKLM\Software\Policies\Google\Chrome\ExtensionInstallWhitelist 3. If the ExtensionInstallWhitelist key is not set to 1 or oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator-approved extension IDs, then this is a finding.
Fix: F-23267r415817_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation whitelist Policy State: Enabled Policy Value: oiigbmnaadbkfbmpbfijlflahbdbdgdf (or 1) Note: oiigbmnaadbkfbmpbfijlflahbdbdgdf is the extension ID for scriptno(a commonly used Chrome extension)
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0007
- Vuln IDs
-
- V-221564
- V-44733
- Rule IDs
-
- SV-221564r508655_rule
- SV-57567
Checks: C-23279r415819_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding.
Fix: F-23268r415820_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted)
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0008
- Vuln IDs
-
- V-221565
- V-44735
- Rule IDs
-
- SV-221565r539431_rule
- SV-57569
Checks: C-23280r539429_chk
If the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization-approved encrypted search string (ex. https://www.google.com/#q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) this is a finding.
Fix: F-23269r539430_fix
If the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider search URL Policy State: Enabled Policy Value: Must be set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0009
- Vuln IDs
-
- V-221566
- V-44737
- Rule IDs
-
- SV-221566r508655_rule
- SV-57571
Checks: C-23281r415825_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display.
Fix: F-23270r415826_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0011
- Vuln IDs
-
- V-221567
- V-44741
- Rule IDs
-
- SV-221567r508655_rule
- SV-57575
Checks: C-23282r415828_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23271r415829_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable Saving Passwords to the Password Manager Policy State: Disabled Policy Value: N/A
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001240
- Version
- DTBC-0013
- Vuln IDs
-
- V-221568
- V-44745
- Rule IDs
-
- SV-221568r508655_rule
- SV-57579
Checks: C-23283r415831_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome 3. If the AllowOutdatedPlugins value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23272r415832_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow running plugins that are outdated Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTBC-0017
- Vuln IDs
-
- V-221570
- V-44753
- Rule IDs
-
- SV-221570r508655_rule
- SV-57587
Checks: C-23285r415837_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23274r415838_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001374
- Version
- DTBC-0020
- Vuln IDs
-
- V-221571
- V-44759
- Rule IDs
-
- SV-221571r508655_rule
- SV-57593
Checks: C-23286r415840_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-23275r415841_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0021
- Vuln IDs
-
- V-221572
- V-44761
- Rule IDs
-
- SV-221572r508655_rule
- SV-57595
Checks: C-23287r478205_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If URLBlacklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlacklist 3. If the URLBlacklist key does not exist, or the does not contain entries 1 set to javascript://*, then this is a finding.
Fix: F-23276r478206_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs Policy State: Enabled Policy Value 1: javascript://*
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001374
- Version
- DTBC-0023
- Vuln IDs
-
- V-221573
- V-44765
- Rule IDs
-
- SV-221573r508655_rule
- SV-57599
Checks: C-23288r478208_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23277r478209_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBC-0025
- Vuln IDs
-
- V-221574
- V-44769
- Rule IDs
-
- SV-221574r508655_rule
- SV-57603
Checks: C-23289r415849_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "NetworkPredictionOptions" is not displayed under the “Policy Name” column or it is not set to "2" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "NetworkPredictionOptions" value name does not exist or its value data is not set to "2," this is a finding.
Fix: F-23278r415850_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable network prediction Policy State: Enabled Policy Value: Do not predict network actions on any network connection
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0026
- Vuln IDs
-
- V-221575
- V-44771
- Rule IDs
-
- SV-221575r508655_rule
- SV-57605
Checks: C-23290r415852_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If MetricsReportingEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the MetricsReportingEnabled value name does not exist or its value data is not set to 0, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display.
Fix: F-23279r415853_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable reporting of usage and crash-related data Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0027
- Vuln IDs
-
- V-221576
- V-44773
- Rule IDs
-
- SV-221576r508655_rule
- SV-57607
Checks: C-23291r415855_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SearchSuggestEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SearchSuggestEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23280r415856_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable search suggestions Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0029
- Vuln IDs
-
- V-221577
- V-44775
- Rule IDs
-
- SV-221577r508655_rule
- SV-57609
Checks: C-23292r415858_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ImportSavedPasswords is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the ImportSavedPasswords value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23281r415859_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Import saved passwords from default browser on first run Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- DTBC-0030
- Vuln IDs
-
- V-221578
- V-44777
- Rule IDs
-
- SV-221578r508655_rule
- SV-57611
Checks: C-23293r415861_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If IncognitoModeAvailability is not displayed under the Policy Name column or it is not set to 1 under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the IncognitoModeAvailability value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-23282r415862_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Incognito mode availability Policy State: Enabled Policy Value: Incognito mode disabled
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTBC-0037
- Vuln IDs
-
- V-221579
- V-44789
- Rule IDs
-
- SV-221579r508655_rule
- SV-57623
Checks: C-23294r415864_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If EnableOnlineRevocationChecks is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the EnableOnlineRevocationChecks value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-23283r415865_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Whether online OCSP/CRL checks are performed Policy State: Enabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0038
- Vuln IDs
-
- V-221580
- V-44791
- Rule IDs
-
- SV-221580r508655_rule
- SV-57625
Checks: C-23295r415867_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SafeBrowsingEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-23284r415868_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Safe Browsing Settings Policy Name: Enable Safe Browsing Policy State: Enabled Policy Value: N/A
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTBC-0039
- Vuln IDs
-
- V-221581
- V-44793
- Rule IDs
-
- SV-221581r508655_rule
- SV-57627
Checks: C-23296r415870_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy 'SavingBrowserHistoryDisabled' is not shown or is not set to false, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SavingBrowserHistoryDisabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23285r415871_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable saving browser history Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0040
- Vuln IDs
-
- V-221582
- V-44795
- Rule IDs
-
- SV-221582r508655_rule
- SV-57629
Checks: C-23297r415873_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "DefaultPluginsSetting" is not shown or is not set to "3", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\DefaultPluginsSetting 3. If this key "DefaultPluginsSetting" does not exist or is not set to "3", this is a finding.
Fix: F-23286r415874_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default Flash setting Policy State: Enabled Policy Value: Click to play
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- DTBC-0045
- Vuln IDs
-
- V-221583
- V-44799
- Rule IDs
-
- SV-221583r508655_rule
- SV-57633
Checks: C-23298r415876_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy ”CookiesSessionOnlyForUrls” exists, and has any defined values, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\CookiesSessionOnlyForUrls 3. If this key exists and has any defined values, this is a finding.
Fix: F-23287r415877_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Allow session only cookies on these sites Policy State: Disabled Policy Value: N/A
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- DTBC-0050
- Vuln IDs
-
- V-221584
- V-44805
- Rule IDs
-
- SV-221584r508655_rule
- SV-57639
Checks: C-23299r415879_chk
Universal method: 1. In the omnibox (address bar) type chrome://settings/help 2. Cross-reference the build information displayed with the Google Chrome site to identify, at minimum, the oldest supported build available. As of July 2019, this is 74.x.x. 3. If the installed version of Chrome is not supported by Google, this is a finding.
Fix: F-23288r415880_fix
Install a supported version of Google Chrome.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0051
- Vuln IDs
-
- V-221585
- V-52795
- Rule IDs
-
- SV-221585r508655_rule
- SV-67011
Checks: C-23300r415882_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PluginsAllowedForUrls is not displayed under the Policy Name column or it is not set to a list of administrator approved URLs under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PluginsAllowedForUrls key does not exist and it does not contain a list of administrator approved URLs then this is a finding. Suggested: the set or subset of [*.]mil and [*.]gov
Fix: F-23289r415883_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Allow the Flash plugin on these sites Policy State: Enabled Policy Value 1: [*.]mil Policy Value 2: [*.]gov
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0052
- Vuln IDs
-
- V-221586
- V-75165
- Rule IDs
-
- SV-221586r508655_rule
- SV-89845
Checks: C-23301r415885_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "AllowDeletingBrowserHistory" is not shown or is not set to false, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "AllowDeletingBrowserHistory" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23290r415886_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable deleting browser and download history Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0053
- Vuln IDs
-
- V-221587
- V-79929
- Rule IDs
-
- SV-221587r508655_rule
- SV-94633
Checks: C-23302r415888_chk
Universal method: 1. In the omnibox (address bar) type chrome:// policy 2. If "PromptForDownloadLocation" is not displayed under the "Policy Name" column or it is not set to "true" under the "Policy Value" column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "PromptForDownloadLocation" value name does not exist or its value data is not set to "1", this is a finding.
Fix: F-23291r415889_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Ask where to save each file before downloading Policy State: Enabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0055
- Vuln IDs
-
- V-221588
- V-79931
- Rule IDs
-
- SV-221588r508655_rule
- SV-94635
Checks: C-23303r415891_chk
If the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome:// policy 2. If "DownloadRestrictions" is not displayed under the "Policy Name" column or it is not set to "1" or "2" under the "Policy Value" column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "DownloadRestrictions" value name does not exist or its value data is not set to "1" or "2", then this is a finding.
Fix: F-23292r415892_fix
If the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow download restrictions Policy State: 1 or 2 Policy Value: N/A
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- DTBC-0056
- Vuln IDs
-
- V-221589
- V-81583
- Rule IDs
-
- SV-221589r508655_rule
- SV-96297
Checks: C-23304r478211_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "SSLVersionMin" is not displayed under the "Policy Name" column or it is not set to "tls1.1", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "SSLVersionMin" value name does not exist or its value data is not set to "tls1.1", this is a finding.
Fix: F-23293r478212_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Minimum SSL version enabled Policy State: Enabled Policy Value: TLS 1.1
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0057
- Vuln IDs
-
- V-221590
- V-81585
- Rule IDs
-
- SV-221590r508655_rule
- SV-96299
Checks: C-23305r415897_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "SafeBrowsingExtendedReportingEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "SafeBrowsingExtendedReportingEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23294r415898_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Safe Browsing settings\ Policy Name: Enable Safe Browsing Extended Reporting Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0058
- Vuln IDs
-
- V-221591
- V-81587
- Rule IDs
-
- SV-221591r508655_rule
- SV-96301
Checks: C-23306r415900_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "DefaultWebUsbGuardSetting" is not displayed under the "Policy Name" column or it is not set to "2", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "DefaultWebUsbGuardSetting" value name does not exist or its value data is not set to "2", this is a finding.
Fix: F-23295r415901_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Control use of the WebUSB API Policy State: Enabled Policy Value: 2
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0060
- Vuln IDs
-
- V-221592
- V-81591
- Rule IDs
-
- SV-221592r508655_rule
- SV-96305
Checks: C-23307r415903_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "ChromeCleanupEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "ChromeCleanupEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23296r415904_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Enables Chrome Cleanup on Windows Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0061
- Vuln IDs
-
- V-221593
- V-81593
- Rule IDs
-
- SV-221593r508655_rule
- SV-96307
Checks: C-23308r415906_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "ChromeCleanupReportingEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "ChromeCleanupReportingEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23297r415907_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Control how Chrome Cleanup reports data to Google Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0063
- Vuln IDs
-
- V-221594
- V-81597
- Rule IDs
-
- SV-221594r508655_rule
- SV-96311
Checks: C-23309r415909_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "EnableMediaRouter" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "EnableMediaRouter" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23298r415910_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Google Cast Policy Name: Enable Google Cast Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0064
- Vuln IDs
-
- V-221595
- V-81581
- Rule IDs
-
- SV-221595r508655_rule
- SV-96295
Checks: C-23310r415912_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "AutoplayAllowed" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "AutoplayAllowed" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23299r415913_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow media autoplay Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBC-0065
- Vuln IDs
-
- V-221596
- V-81589
- Rule IDs
-
- SV-221596r508655_rule
- SV-96303
Checks: C-23311r415915_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If “AutoplayWhitelist” is not displayed under the “Policy Name” column or it is not set to a list of administrator-approved URLs under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “AutoplayWhitelist” key does not exist and it does not contain a list of administrator-approved URLs, this is a finding. Suggested: the set or subset of [*.]mil and [*.]gov
Fix: F-23300r415916_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Allow media autoplay on a whitelist of URL patterns Policy State: Enabled Policy Value 1: [*.]mil Policy Value 2: [*.]gov
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0066
- Vuln IDs
-
- V-221597
- V-91203
- Rule IDs
-
- SV-221597r508655_rule
- SV-101303
Checks: C-23312r415918_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "UrlKeyedAnonymizedDataCollectionEnabled" is not displayed under the “Policy Name” column or it is not set to "0" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “UrlKeyedAnonymizedDataCollectionEnabled" value name does not exist or its value data is not set to "0," this is a finding.
Fix: F-23301r415919_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable URL-keyed anonymized data collection Policy State: Disabled Policy Value: NA
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0067
- Vuln IDs
-
- V-221598
- V-91205
- Rule IDs
-
- SV-221598r508655_rule
- SV-101305
Checks: C-23313r415921_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "WebRtcEventLogCollectionAllowed" is not displayed under the “Policy Name” column or it is not set to "0" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "WebRtcEventLogCollectionAllowed" value name does not exist or its value data is not set to "0," this is a finding.
Fix: F-23302r415922_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow collection of WebRTC event logs from Google services Policy State: Disabled Policy Value: NA
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- DTBC-0068
- Vuln IDs
-
- V-221599
- V-97525
- Rule IDs
-
- SV-221599r508655_rule
- SV-106629
Checks: C-23314r478214_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "DeveloperToolsAvailability" is not shown or is not set to "2", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the key "DeveloperToolsAvailability" does not exist or is not set to "2", this is a finding.
Fix: F-23303r478215_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Control where Developer Tools can be used Policy State: Enabled Policy Value: Disallow usage of the Developer Tools
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0069
- Vuln IDs
-
- V-226401
- V-102867
- Rule IDs
-
- SV-226401r508655_rule
- SV-111829
Checks: C-28109r478217_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BrowserGuestModeEnabled is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BrowserGuestModeEnabled value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28097r478218_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable guest mode in browser Policy State: Disabled
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0070
- Vuln IDs
-
- V-226402
- V-102869
- Rule IDs
-
- SV-226402r508655_rule
- SV-111831
Checks: C-28110r478220_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AutofillCreditCardEnabled is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the AutofillCreditCardEnabled value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28098r478221_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable AutoFill for credit cards Policy State: Disabled
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0071
- Vuln IDs
-
- V-226403
- V-102871
- Rule IDs
-
- SV-226403r508655_rule
- SV-111833
Checks: C-28111r478223_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AutofillAddressEnabled is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the AutofillAddressEnabled value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28099r478224_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable AutoFill for addresses Policy State: Disabled
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0072
- Vuln IDs
-
- V-226404
- V-102873
- Rule IDs
-
- SV-226404r508655_rule
- SV-111835
Checks: C-28112r478226_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ImportAutofillFormData is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the ImportAutofillFormData value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28100r478227_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Import autofill form data from default browser on first run Policy State: Disabled