Google Chrome Current Windows STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 3
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 3
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0001
- Vuln IDs
-
- V-44711
- Rule IDs
-
- SV-57545r3_rule
Checks: C-49503r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49801r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Configure remote access options Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- L
- CCI
- Version
- DTBC-0003
- Vuln IDs
-
- V-44713
- Rule IDs
-
- SV-57547r1_rule
Checks: C-49507r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultNotificationsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultNotificationsSetting value name does not exist or its value data is not set to 2, then this is a finding.
Fix: F-49807r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default notification setting Policy State: Enabled Policy Value: Do not allow any site to show desktop notifications
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0004
- Vuln IDs
-
- V-44719
- Rule IDs
-
- SV-57553r1_rule
Checks: C-49509r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding.
Fix: F-49809r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0002
- Vuln IDs
-
- V-44723
- Rule IDs
-
- SV-57557r1_rule
Checks: C-49511r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding.
Fix: F-49813r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0005
- Vuln IDs
-
- V-44727
- Rule IDs
-
- SV-57561r1_rule
Checks: C-49513r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlacklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlacklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding.
Fix: F-49817r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blacklist Policy State: Enabled Policy Value: *
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0006
- Vuln IDs
-
- V-44729
- Rule IDs
-
- SV-57563r1_rule
Checks: C-49515r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallWhitelist is not displayed under the Policy Name column or it is not set to oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator approved extension IDs, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallWhitelist 3. If the ExtensionInstallWhitelist key does not exist or is not set to oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator approved extension IDs, then this is a finding.
Fix: F-49821r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation whitelist Policy State: Enabled Policy Value: oiigbmnaadbkfbmpbfijlflahbdbdgdf Note: oiigbmnaadbkfbmpbfijlflahbdbdgdf is the extension ID for scriptno(a commonly used Chrome extension)
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0007
- Vuln IDs
-
- V-44733
- Rule IDs
-
- SV-57567r1_rule
Checks: C-49517r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding.
Fix: F-49825r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted)
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0008
- Vuln IDs
-
- V-44735
- Rule IDs
-
- SV-57569r1_rule
Checks: C-49519r7_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization approved encrypted search string (ex. https://www.google.com/#q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization approved encrypted search string (ex. https://www.google.com/#q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) then this is a finding.
Fix: F-49827r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider search URL Policy State: Enabled Policy Value: must be set to an organization approved encrypted search string (ex. https://www.google.com/#q={searchTerms} or https://www.bing.com/search?q={searchTerms} )
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0009
- Vuln IDs
-
- V-44737
- Rule IDs
-
- SV-57571r1_rule
Checks: C-49521r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49829r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0010
- Vuln IDs
-
- V-44739
- Rule IDs
-
- SV-57573r1_rule
Checks: C-49523r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerAllowShowPasswords is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerAllowShowPasswords value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49831r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password manager\ Policy Name: Allow users to show passwords in Password Manager Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0011
- Vuln IDs
-
- V-44741
- Rule IDs
-
- SV-57575r1_rule
Checks: C-49525r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49833r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable the password manager Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0012
- Vuln IDs
-
- V-44743
- Rule IDs
-
- SV-57577r1_rule
Checks: C-49527r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AuthSchemes is not displayed under the Policy Name column or it is not set to negotiate under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome 3. If the AuthSchemes value name does not exist or its value data is not set to negotiate, then this is a finding.
Fix: F-49835r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Policies for HTTP Authentication\ Policy Name: Supported authentication schemes Policy State: Enabled Policy Value: negotiate
- RMF Control
- Severity
- H
- CCI
- Version
- DTBC-0013
- Vuln IDs
-
- V-44745
- Rule IDs
-
- SV-57579r1_rule
Checks: C-49529r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome 3. If the AllowOutdatedPlugins value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49837r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow running plugins that are outdated Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- H
- CCI
- Version
- DTBC-0014
- Vuln IDs
-
- V-44749
- Rule IDs
-
- SV-57583r1_rule
Checks: C-49531r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AlwaysAuthorizePlugins is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the AlwaysAuthorizePlugins value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49839r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Always runs plugins that require authorization Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- L
- CCI
- Version
- DTBC-0015
- Vuln IDs
-
- V-44751
- Rule IDs
-
- SV-57585r1_rule
Checks: C-49533r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BlockThirdPartyCookies is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BlockThirdPartyCookies value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49841r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block third party cookies Policy State: Enabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0017
- Vuln IDs
-
- V-44753
- Rule IDs
-
- SV-57587r1_rule
Checks: C-49535r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49845r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0019
- Vuln IDs
-
- V-44757
- Rule IDs
-
- SV-57591r1_rule
Checks: C-49539r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If Disable3DAPIs is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the Disable3DAPIs value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49849r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable support for 3D graphics APIs Policy State: Enabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0020
- Vuln IDs
-
- V-44759
- Rule IDs
-
- SV-57593r1_rule
Checks: C-49541r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49851r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0021
- Vuln IDs
-
- V-44761
- Rule IDs
-
- SV-57595r2_rule
Checks: C-49543r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If URLBlacklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlacklist 3. If the URLBlacklist key does not exist, or the does not contain entries 1 set to javascript://*, then this is a finding.
Fix: F-49853r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs Policy State: Enabled Policy Value 1: javascript://*
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0022
- Vuln IDs
-
- V-44763
- Rule IDs
-
- SV-57597r1_rule
Checks: C-49545r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AutoFillEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the AutoFillEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49855r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable AutoFill Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0023
- Vuln IDs
-
- V-44765
- Rule IDs
-
- SV-57599r1_rule
Checks: C-49547r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49857r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0025
- Vuln IDs
-
- V-44769
- Rule IDs
-
- SV-57603r1_rule
Checks: C-49549r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DnsPrefetchingEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DnsPrefetchingEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49859r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable network prediction Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0026
- Vuln IDs
-
- V-44771
- Rule IDs
-
- SV-57605r1_rule
Checks: C-49551r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If MetricsReportingEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the MetricsReportingEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49861r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable reporting of usage and crash-related data Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0027
- Vuln IDs
-
- V-44773
- Rule IDs
-
- SV-57607r1_rule
Checks: C-49553r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SearchSuggestEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SearchSuggestEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49863r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable search suggestions Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0029
- Vuln IDs
-
- V-44775
- Rule IDs
-
- SV-57609r3_rule
Checks: C-49555r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ImportSavedPasswords is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the ImportSavedPasswords value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49865r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Import saved passwords from default browser on first run Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0030
- Vuln IDs
-
- V-44777
- Rule IDs
-
- SV-57611r1_rule
Checks: C-49557r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If IncognitoModeAvailability is not displayed under the Policy Name column or it is not set to 1 under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the IncognitoModeAvailability value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49867r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Incognito mode availability Policy State: Enabled Policy Value: Incognito mode disabled
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0034
- Vuln IDs
-
- V-44781
- Rule IDs
-
- SV-57615r1_rule
Checks: C-49561r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DisabledPlugins is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\DisabledPlugins 3. If the DisabledPlugins key does not exist, or the 1 value name does not exist under that key and the value data is not set to * then this is a finding.
Fix: F-49873r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Specify a list of disabled plugins Policy State: Enabled Policy Value: *
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0035
- Vuln IDs
-
- V-44783
- Rule IDs
-
- SV-57617r2_rule
Checks: C-49563r6_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If EnabledPlugins is not displayed under the Policy Name column or does not contain a list of administrator approved Plugins under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\EnabledPlugins 3. If the EnabledPlugins key does not exist and does not contain a set of administrator approved Plugins then this is a finding. Suggested: the set or subset of Shockwave Flash, Chrome PDF Viewer, Silverlight, Java*
Fix: F-49875r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Specify a list of enabled plugins Policy State: Enabled Policy Value 1: Shockwave Flash Policy Value 2: Chrome PDF Viewer Policy Value 3: Silverlight Policy Value 4: Java*
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0036
- Vuln IDs
-
- V-44787
- Rule IDs
-
- SV-57621r1_rule
Checks: C-49565r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DisablePluginFinder is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DisablePluginFinder value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49877r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Specify whether the plugin finder should be disabled Policy State: Enabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0037
- Vuln IDs
-
- V-44789
- Rule IDs
-
- SV-57623r1_rule
Checks: C-49567r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If EnableOnlineRevocationChecks is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the EnableOnlineRevocationChecks value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49879r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Whether online OCSP/CRL checks are performed Policy State: Enabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0038
- Vuln IDs
-
- V-44791
- Rule IDs
-
- SV-57625r1_rule
Checks: C-49569r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SafeBrowsingEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49881r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable Safe Browsing Policy State: Enabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0039
- Vuln IDs
-
- V-44793
- Rule IDs
-
- SV-57627r1_rule
Checks: C-49571r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy 'SavingBrowserHistoryDisabled' is not shown or is not set to false, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SavingBrowserHistoryDisabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49883r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable saving browser history Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0040
- Vuln IDs
-
- V-44795
- Rule IDs
-
- SV-57629r2_rule
Checks: C-49573r2_chk
Universal method: 1. In the omnibox(address bar) type chrome://policy 2. If the policy 'DefaultPluginsSetting' is not shown or is not set to 'Click to play', this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\DefaultPluginsSetting 3. If this key does not exist or is not set to 3 this is a finding.
Fix: F-49885r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default plugins setting Policy State: Enabled Policy Value: Click to play
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0045
- Vuln IDs
-
- V-44799
- Rule IDs
-
- SV-57633r2_rule
Checks: C-49577r3_chk
Universal method: 1. In the omnibox(address bar) type chrome://policy 2. If the policy 'CookiesSessionOnlyForUrls' has any defined values, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Google Chrome\Content Settings\CookiesSessionOnlyForUrls 3. If this key does not exist or has any defined values this is a finding
Fix: F-49889r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Allow session only cookies on these sites Policy State: Disabled Policy Value: N/A
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0048
- Vuln IDs
-
- V-44801
- Rule IDs
-
- SV-57635r2_rule
Checks: C-49579r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If HomepageLocation is not displayed under the Policy Name column or it is not set to an organizationally approved default home page. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the HomepageLocation value name does not exist or its value data is not set to an organizationally approved default home page.
Fix: F-49891r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Home page Policy Name: Configure the home page URL Policy State: Enabled Policy Value: An organizationally approved default home page.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0050
- Vuln IDs
-
- V-44805
- Rule IDs
-
- SV-57639r2_rule
Checks: C-49583r2_chk
Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Update\ 3. If the AutoUpdateCheckPeriodMinutes value name does not exist or its value is set to 0 or greater than 10080, this is a finding.
Fix: F-49895r4_fix
1. Start regedit 2. Navigate to Key Path: HKLM\Software\Policies\Google\Update Value Name: AutoUpdateCheckPeriodMinutes Value Type: Boolean (REG_DWORD) Value Data: 10080 or less, but not 0.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBC-0051
- Vuln IDs
-
- V-52795
- Rule IDs
-
- SV-67011r1_rule
Checks: C-54515r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PluginsAllowedForUrls is not displayed under the Policy Name column or it is not set to a list of administrator approved URLs under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PluginsAllowedForUrls key does not exist and it does not contain a list of administrator approved URLs then this is a finding. Suggested: the set or subset of *.mil and *.gov
Fix: F-57613r1_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Allow plugins on these sites Policy State: Enabled Policy Value 1: *.mil Policy Value 2: *.gov