Internet Explorer 8 STIG

U_Microsoft_IE8_V1R15_Manual-xccdf.xml

The Internet Explorer 8 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Browser products may observe alternate registry paths for stored configuration values.
Details

Version / Release: V1R15

Published: 2014-10-01

Updated At: 2018-09-23 04:56:07

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.
    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-25182r1_rule DTBI320 MEDIUM Internet Explorer is not configured to require consistent security zone settings to all users. This setting enforces consistent security zone settings to all users of the computer. Security zones control browser behavior at various web sites and it is desirable to maintain a consistent policy for all users of a machine.HKSystem AdministratorECSC-1
    SV-25181r1_rule DTBI319 MEDIUM Internet Explorer is configured to allow users to change policies. This setting prevents users from changing the Internet Explorer policies on the machine. Policy changes should be made by administrators only, so this setting should be enabled.HKSystem AdministratorECSC-1
    SV-25180r1_rule DTBI318 MEDIUM Internet Explorer is configured to allow users to add/delete sites. This setting prevents users from adding sites to various security zones. Users should not be able to add sites to different zones, as this could allow them to bypass security controls of the system.HKSystem AdministratorECSC-1
    SV-25555r1_rule DTBI367 LOW Internet Explorer is not configured to disable making Proxy Settings Per Machine. This setting controls whether or not the Internet Explorer proxy settings are configured on a per-user or per-machine basis.System AdministratorECSC-1
    SV-6278r3_rule DTBI001 MEDIUM The IE home page is not set to blank or a trusted site. By setting this parameter appropriately, a malicious web site will not be automatically loaded into a browser which may contain mobile code.System AdministratorDCMC-1
    SV-43158r3_rule DTBI014 MEDIUM The IE SSL/TLS parameter must be set correctly. This parameter ensures only DoD-approved ciphers and algorithms are enabled for use by the web browser. TLS and SSL are protocols for protecting communication between the browser and the target server. When the browser attempts to set up a protected communication with the target server, the browser and server negotiate which protocol and version to use. The browser and server attempt to match each other’s list of supported protocols and versions and pick the most preferred match. System AdministratorECSC-1
    SV-43155r1_rule DTBI015 MEDIUM The IE warning about certificate address mismatch must be enforced. This parameter warns users if the certificate being presented by the web site is invalid. Since server certificates are used to validate the identity of the web server it is critical to warn the user of a potential issue with the certificate being presented by the web server. This setting aids to prevent spoofing attacks.System AdministratorECSC-1
    SV-25613r1_rule DTBI022 MEDIUM The Download signed ActiveX controls property is not set properly for the Internet Zone. Active X controls can contain potentially malicious code and must only be allowed to be downloaded from trusted sites.System AdministratorDCMC-1
    SV-25615r1_rule DTBI023 MEDIUM The Download unsigned ActiveX controls property is not set properly for the Internet Zone. Active X controls can contain potentially malicious code and must only be allowed to be downloaded from trusted sites and they must be digitally signed. System AdministratorDCMC-1
    SV-25616r1_rule DTBI024 MEDIUM The Initialize and script ActiveX controls not marked as safe property is not set properly for the Internet Zone. ActiveX controls that are not marked safe scripting should not be executed. Although this is not a complete security measure for a control to be marked safe for scripting, if a control is not marked safe, it should not be initialized and executed.System AdministratorDCMC-1
    SV-25609r1_rule DTBI030 MEDIUM The Font download control is not set properly for the Internet Zone. Download of fonts can sometimes contain malicious code. System AdministratorDCMC-1
    SV-25618r1_rule DTBI031 MEDIUM The Java Permissions is not set properly for the Internet Zone. Java must have levels of protection based upon the site being browsed.System AdministratorDCMC-1
    SV-25606r1_rule DTBI032 MEDIUM The Access data sources across domains is not set properly for the Internet Zone. Access to data sources across multiple domains must be controlled based upon the site being browsed.System AdministratorDCMC-1
    SV-25608r1_rule DTBI036 MEDIUM The Allow Drag and drop or copy and paste files is not set properly for the Internet Zone. Drag and Drop or copy and paste files must have a level of protection based upon the site being accessed.System AdministratorECSC-1
    SV-25610r1_rule DTBI037 MEDIUM The Installation of desktop items is not set properly for the Internet Zone. Installation of items must have a level of protection based upon the site being accessed.System AdministratorDCMC-1
    SV-25619r1_rule DTBI038 MEDIUM The Launching programs and files in IFRAME are not set properly for the Internet Zone. Launching of programs in IFRAME must have a level of protection based upon the site being accessed.System AdministratorDCMC-1
    SV-25624r1_rule DTBI039 MEDIUM The Navigate windows and frames across different domains is not set properly for the Internet Zone. Frames that navigate across different domains are a security concern, because the user may think they are accessing pages on one site while they are actually accessing pages on another site.System AdministratorECSC-1
    SV-25626r1_rule DTBI042 MEDIUM The Userdata persistence is not set properly for the Internet Zone. Userdata persistence must have a level of protection based upon the site being accessed.System AdministratorECSC-1
    SV-25607r1_rule DTBI044 MEDIUM The Allow paste operations via script is not set properly for the Internet Zone. Allow paste operations via script must have a level of protection based upon the site being accessed.System AdministratorECSC-1
    SV-25622r1_rule DTBI046 MEDIUM The user Authentication - Logon is not set properly for the Internet Zone. Care must be taken with user credentials and how automatic logons are performed and how default Windows credentials are passed to web sites.System AdministratorECSC-1
    SV-25627r1_rule DTBI061 MEDIUM The Java Permissions is not set properly for the Local Zone. Java must have a level of protection based upon the site being browsed. System AdministratorDCMC-1
    SV-25647r1_rule DTBI091 MEDIUM The Java Permissions is not set properly for the Trusted Sites Zone. Java must have a level of protection based upon the site being browsed.System AdministratorDCMC-1
    SV-25636r1_rule DTBI112 MEDIUM The Download signed ActiveX controls property is not set properly for the Restricted Sites Zone. ActiveX controls can contain potentially malicious code and must only be allowed to be downloaded from trusted sites.System AdministratorDCMC-1
    SV-25637r1_rule DTBI113 MEDIUM The Download unsigned ActiveX controls property is not set properly for the Restricted Sites Zone. ActiveX controls can contain potentially malicious code and must only be allowed to be downloaded from trusted sites and they must be digitally signed.System AdministratorDCMC-1
    SV-25638r1_rule DTBI114 MEDIUM The Initialize and script ActiveX controls not marked as safe property is not set properly for the Restricted Sites Zone. ActiveX controls that are not marked safe for scripting should not be executed. Although this is not a complete security measure for a control to be marked safe for scripting, if a control is not marked safe, it should not be initialized and executed.System AdministratorDCMC-1
    SV-25643r1_rule DTBI115 MEDIUM Run ActiveX controls and plug-ins property is not set properly for the Restricted Sites Zone. ActiveX controls that are not marked safe for scripting should not be executed. Although this is not a complete security measure for a control to be marked safe for scripting, if a control is not marked safe, it should not be initialized and executed.System AdministratorDCMC-1
    SV-25644r1_rule DTBI116 MEDIUM The Script ActiveX controls marked safe for scripting property is not set properly for the Restricted Sites Zone. ActiveX controls that are not marked safe for scripting should not be executed. Although this is not a complete security measure for a control to be marked safe for scripting, if a control is not marked safe, it should not be initialized and executed.System AdministratorDCMC-1
    SV-25632r1_rule DTBI119 MEDIUM The File download control is not set properly for the Restricted Sites Zone. Files should not be able to be downloaded from sites that are considered restricted.System AdministratorDCMC-1
    SV-25633r1_rule DTBI120 MEDIUM The Font download control is not set properly for the Restricted Sites Zone. Download of fonts can sometimes contain malicious code. Files should not be downloaded from restricted sites.System AdministratorDCMC-1
    SV-25628r1_rule DTBI122 MEDIUM The Access data sources across domains is not set properly for the Restricted Sites Zone. The restricted zones is used for MS Outlook. This zone must be set properly to ensure Outlook is secured.System AdministratorDCMC-1
    SV-25635r1_rule DTBI123 MEDIUM The Allow META REFRESH is not set properly for the Restricted Sites Zone. Allow META REFRESH must have a level of protection based upon the site being browsed.System AdministratorDCMC-1
    SV-25631r1_rule DTBI126 MEDIUM The Drag and drop or copy and paste files is not set properly for the Restricted Sites Zone. Drag and Drop of files must have a level of protection based upon the site being accessed.System AdministratorECSC-1
    SV-25634r1_rule DTBI127 MEDIUM The Installation of desktop items is not set properly for the Restricted Sites Zone. Installation of items must have level of protection based upon the site being accessed. System AdministratorDCMC-1
    SV-25640r1_rule DTBI128 MEDIUM The Launching programs and files in IFRAME is not set properly for the Restricted Sites Zone. Launching of programs in IFRAME must have a level of protection based upon the site being accessed.System AdministratorDCMC-1
    SV-25642r1_rule DTBI129 MEDIUM The Navigate windows and frames across different domains are not set properly for the Restricted Sites Zone. Frames that navigate across different domains are a security concern, because users may think they are accessing pages on one site while they are actually accessing pages on another site. System AdministratorECSC-1
    SV-25646r1_rule DTBI132 MEDIUM The Userdata persistence is not set properly for the Restricted Sites Zone. No persistence data should exist and be used in the Restricted Sites Zone. System AdministratorECSC-1
    SV-25629r1_rule DTBI133 MEDIUM The Active scripting is not set properly for the Restricted Sites Zone. Active scripting must have a level of protection based upon the site being accessed.System AdministratorDCMC-1
    SV-25630r1_rule DTBI134 MEDIUM The Allow paste operations via script is not set properly for the Restricted Sites Zone. The Allow paste operations via script must have a level of protection based upon the site being browsed.System AdministratorECSC-1
    SV-25641r1_rule DTBI136 MEDIUM The User Authentication – Logon is not set properly for the Restricted Sites Zone. Care must be taken with user credentials and how automatic logons are performed and how default Windows credentials are passed to web sites. System AdministratorECSC-1
    SV-25639r1_rule DTBI121 MEDIUM The Java Permissions is not set properly for the Restricted Sites Zone. Java must have a level of protection based upon the site being browsed.System AdministratorDCMC-1
    SV-25817r1_rule DTBI697 LOW Internet Explorer - Do not allow users to enable or disable add-ons. This check verifies that the system is configured to allow users to enable or disable add-ons through Add-On Manager in Internet Explorer.System AdministratorECSC-1
    SV-25553r1_rule DTBI305 MEDIUM Automatic configuration of Internet Explorer is not disabled. This setting specifies to automatically detect the proxy server settings used to connect to the Internet and customize Internet Explorer. This setting specifies that Internet Explorer use the configuration settings provided in a file by the system administrator. If you enable this policy setting, the user will not be able to do automatic configuration. You can import your current connection settings from your machine using Internet Explorer Maintenance under Admin Templates using group policy editor. If you disable or do no configure this policy setting, the user will have the freedom to automatically configure these settings.System AdministratorInformation Assurance OfficerECSC-1
    SV-44917r1_rule DTBI315 MEDIUM Prevent participation in the Customer Experience Improvement Program is not disabled. This setting controls whether users can participate in the Microsoft Customer Experience Improvement Program to help improve Microsoft applications. When users choose to participate in the Customer Experience Improvement Program (CEIP), applications automatically send information to Microsoft about how the applications are used. This information is combined with other CEIP data to help Microsoft solve problems and to improve the products and features customers use most often. This feature does not collect users' names, addresses, or any other identifying information except the IP address that is used to send the data. By default, users have the opportunity to opt into participation in the CEIP the first time they run an application. If your organization has policies that govern the use of external resources such as the CEIP, allowing users to opt in to the program might cause them to violate these policies. System AdministratorInformation Assurance OfficerECSC-1
    SV-25560r1_rule DTBI325 MEDIUM Turn off the Security Settings Check feature is not disabled. This policy setting turns off the Security Settings Check feature, which checks Internet Explorer security settings to determine when the settings put Internet Explorer at risk. If you enable this policy setting, the security settings check will not be performed. If you disable or do not configure this policy setting, the security settings check will be performed.System AdministratorInformation Assurance OfficerECSC-1
    SV-25561r1_rule DTBI340 MEDIUM Allow active content from CDs to run on user machines is not disabled. This policy setting allows you to manage whether users receive a dialog requesting permission for active content on a CD to run. If you enable this policy setting, active content on a CD will run without a prompt. If you disable this policy setting, active content on a CD will always prompt before running. If you do not configure this policy, users can choose whether to be prompted before running active content on a CD. System AdministratorInformation Assurance OfficerECSC-1
    SV-25562r2_rule DTBI350 MEDIUM Allow software to run or install even if the signature is invalid is not disabled. Microsoft ActiveX controls and file downloads often have digital signatures attached that vouch for both the file's integrity and the identity of the signer (creator) of the software. An invalid signature might indicate that someone has tampered with the file.System AdministratorInformation Assurance OfficerDCMC-1
    SV-25564r2_rule DTBI355 MEDIUM Allow third-party browser extensions are not disabled. This policy setting allows you to manage whether Internet Explorer will launch COM add-ons, known as browser helper objects such as toolbars. Browser helper objects may contain flaws such as buffer overruns which impact Internet Explorer's performance or stability. If you enable this policy setting, Internet Explorer automatically launches any browser helper objects that are installed on the user's computer. If you disable this policy setting, browser helper objects do not launch. If you do not configure this policy, Internet Explorer automatically launches any browser helper objects that are installed on the user's computer.System AdministratorInformation Assurance OfficerECSC-1
    SV-25566r1_rule DTBI365 MEDIUM Check for server certificate revocation is not enabled. This policy setting allows you to manage whether Internet Explorer will check revocation status of servers' certificates. Certificates are revoked when they have been compromised or are no longer valid, and this option protects users from submitting confidential data to a site that may be fraudulent or not secure. If you enable this policy setting, Internet Explorer will check to see if server certificates have been revoked. If you disable this policy setting, Internet Explorer will not check server certificates to see if they have been revoked. If you do not configure this policy setting, Internet Explorer will not check server certificates to see if they have been revoked.System AdministratorInformation Assurance OfficerIATS-1, IATS-2
    SV-25567r1_rule DTBI370 MEDIUM Check for signatures on downloaded programs is not enabled. This policy setting allows you to manage whether Internet Explorer checks for digital signatures (which identifies the publisher of signed software and verifies it hasn't been modified or tampered with) on user computers before downloading executable programs. If you enable this policy setting, Internet Explorer will check the digital signatures of executable programs and display their identities before downloading them to user computers. If you disable this policy setting, Internet Explorer will not check the digital signatures of executable programs or display their identities before downloading them to user computers. If you do not configure this policy, Internet Explorer will not check the digital signatures of executable programs or display their identities before downloading them to user computers. System AdministratorInformation Assurance OfficerECSC-1
    SV-25568r1_rule DTBI375 MEDIUM Intranet Sites: Include all network paths (UNCs) are disabled. This policy setting controls whether URLs representing UNCs are mapped into the local Intranet security zone. If you enable this policy setting, all network paths are mapped into the Intranet Zone. If you disable this policy setting, network paths are not necessarily mapped into the Intranet Zone (other rules might map one there). If you do not configure this policy setting, users choose whether network paths are mapped into the Intranet Zone.System AdministratorInformation Assurance OfficerECSC-1
    SV-25569r1_rule DTBI385 MEDIUM Allow script-initiated windows without size or position constraints for Internet Zone is not disabled. This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title and status bars. If you enable this policy setting, Windows Restrictions security will not apply in this zone. The security zone runs without the added layer of security provided by this feature. If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. If you do not configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. System AdministratorInformation Assurance OfficerECSC-1
    SV-25585r1_rule DTBI390 MEDIUM Allow script-initiated windows without size or position constraints for Restricted Sites Zone is not disabled. This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title and status bars. If you enable this policy setting, Windows Restrictions security will not apply in this zone. The security zone runs without the added layer of security provided by this feature. If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. If you do not configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. System AdministratorInformation Assurance OfficerECSC-1
    SV-25570r1_rule DTBI395 MEDIUM Allow Scriptlets are not disabled. This policy setting allows you to manage whether scriptlets can be allowed. If you enable this policy setting, users will be able to run scriptlets. If you disable this policy setting, users will not be able to run scriptlets. If you do not configure this policy setting, a scriptlet can be enabled or disabled by the user. System AdministratorInformation Assurance OfficerECSC-1
    SV-25571r2_rule DTBI415 MEDIUM Automatic prompting for file downloads is not disabled. This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Information Bar instead of the file download dialog. Users can then click the Information Bar to allow the file download prompt. System AdministratorInformation Assurance OfficerECSC-1
    SV-25578r2_rule DTBI425 MEDIUM Java permissions for my computer are not disabled. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. If you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.System AdministratorInformation Assurance OfficerDCMC-1
    SV-25581r2_rule DTBI430 MEDIUM Java permissions for my computer group policy are not disabled. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. If you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.System AdministratorInformation Assurance OfficerDCMC-1
    SV-25580r2_rule DTBI435 MEDIUM Java permissions for group policy for Local Intranet Zone are not disabled. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. If you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.System AdministratorInformation Assurance OfficerDCMC-1
    SV-25583r2_rule DTBI440 MEDIUM Java permissions for group policy for Trusted Sites Zone are not disabled. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. If you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.System AdministratorInformation Assurance OfficerDCMC-1
    SV-25579r2_rule DTBI445 MEDIUM Java permissions for group policy for Internet Zone are not disabled. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. If you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.System AdministratorInformation Assurance OfficerDCMC-1
    SV-25582r2_rule DTBI450 MEDIUM Java permissions for group policy for Restricted Sites Zone are not disabled. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Low Safety enables applets to perform all operations. Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. If you disable this policy setting, Java applets cannot run. If you do not configure this policy setting, the permission is set to High Safety.System AdministratorInformation Assurance OfficerDCMC-1
    SV-25572r1_rule DTBI455 MEDIUM Loose XAML files for Internet Zone are not disabled. These are eXtensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that leverage the Windows Presentation Foundation. If you enable this policy setting and the dropdown box is set to Enable, XAML files will be automatically loaded inside Internet Explorer. Users will not be able to change this behavior. If the dropdown box is set to Prompt, users will receive a prompt for loading XAML files. If you disable this policy setting, XAML files will not be loaded inside Internet Explorer. Users will not be able to change this behavior. If you do not configure this policy setting, users will have the freedom to decide whether to load XAML files inside Internet Explorer.System AdministratorInformation Assurance OfficerECSC-1
    SV-25587r1_rule DTBI460 MEDIUM Loose XAML files for Restricted Sites Zone are not disabled. These are eXtensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that leverage the Windows Presentation Foundation. If you enable this policy setting and the dropdown box is set to Enable, XAML files will be automatically loaded inside Internet Explorer. Users will not be able to change this behavior. If the dropdown box is set to Prompt, users will receive a prompt for loading XAML files. If you disable this policy setting, XAML files will not be loaded inside Internet Explorer. Users will not be able to change this behavior. If you do not configure this policy setting, users will have the freedom to decide whether to load XAML files inside Internet Explorer.System AdministratorInformation Assurance OfficerECSC-1
    SV-25573r1_rule DTBI465 MEDIUM Open files based on content, not file extension for Internet Zone is not disabled. This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Internet Explorer of the file type based on a bit signature. If you enable this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. The security zone will run without the added layer of security provided by this feature. If you disable this policy setting, the actions that may be harmful cannot run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. If you do not configure this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. System AdministratorInformation Assurance OfficerECSC-1
    SV-25588r1_rule DTBI470 MEDIUM Open files based on content, not file extension for Restricted Sites Zone is not disabled. This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Internet Explorer of the file type based on a bit signature. If you enable this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. The security zone will run without the added layer of security provided by this feature. If you disable this policy setting, the actions that may be harmful cannot run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. If you do not configure this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. System AdministratorInformation Assurance OfficerECSC-1
    SV-25574r1_rule DTBI475 MEDIUM Turn Off First-Run Opt-In for Internet Zone is not disabled. This policy setting controls the First Run response that users see on a zone-by-zone basis. When a user encounters a new control that has not previously run in Internet Explorer, they may be prompted to approve the control. This feature determines if the user gets the prompt or not. If you enable this policy setting, the Gold Bar prompt will be turned off in the corresponding zone. If you disable this policy setting, the Gold Bar prompt will be turned on in the corresponding zone. If you do not configure this policy setting, the first-run prompt is turned off by default. System AdministratorInformation Assurance OfficerECSC-1
    SV-25592r1_rule DTBI480 MEDIUM Turn Off First-Run Opt-In for Restricted Sites Zone is not disabled. This policy setting controls the First Run response that users see on a zone-by-zone basis. When a user encounters a new control that has not previously run in Internet Explorer, they may be prompted to approve the control. This feature determines if the user gets the prompt or not. If you enable this policy setting, the Gold Bar prompt will be turned off in the corresponding zone. If you disable this policy setting, the Gold Bar prompt will be turned on in the corresponding zone. If you do not configure this policy setting, the first-run prompt is turned off by default. System AdministratorInformation Assurance OfficerECSC-1
    SV-25575r1_rule DTBI485 MEDIUM Turn on Protected Mode Internet Zone is not enabled. Protected mode protects Internet Explorer from exploited vulnerabilities by reducing the locations Internet Explorer can write to in the registry and the file system. If you enable this policy setting, Protected Mode will be turned on. Users will not be able to turn off protected mode. If you disable this policy setting, Protected Mode will be turned off. It will revert to Internet Explorer 6 behavior that allows for Internet Explorer to write to the registry and the file system. Users will not be able to turn on protected mode. If you do not configure this policy, users will be able to turn on or off protected mode. Requires Windows Vista; will be ignored by Windows XP. System AdministratorInformation Assurance OfficerECSC-1
    SV-25593r1_rule DTBI490 MEDIUM Turn on Protected Mode for Restricted Sites Zone is not enabled. VISTA Only Protected mode protects Internet Explorer from exploited vulnerabilities by reducing the locations Internet Explorer can write to in the registry and the file system. If you enable this policy setting, Protected Mode will be turned on. Users will not be able to turn off protected mode. If you disable this policy setting, Protected Mode will be turned off. It will revert to Internet Explorer 6 behavior that allows for Internet Explorer to write to the registry and the file system. Users will not be able to turn on protected mode. If you do not configure this policy, users will be able to turn on or off protected mode. Requires Windows Vista; will be ignored by Windows XP. System AdministratorInformation Assurance OfficerECSC-1
    SV-25576r1_rule DTBI495 MEDIUM Use Pop-up Blocker for Internet Zone is not enabled. This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. If you enable this policy setting, most unwanted pop-up windows are prevented from appearing. If you disable this policy setting, pop-up windows are not prevented from appearing. If you do not configure this policy setting, most unwanted pop-up windows are prevented from appearing.System AdministratorInformation Assurance OfficerECSC-1
    SV-25594r1_rule DTBI500 MEDIUM Use Pop-up Blocker for Restricted Sites Zone is not enabled. This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. If you enable this policy setting, most unwanted pop-up windows are prevented from appearing. If you disable this policy setting, pop-up windows are not prevented from appearing. If you do not configure this policy setting, most unwanted pop-up windows are prevented from appearing.System AdministratorInformation Assurance OfficerECSC-1
    SV-25577r1_rule DTBI515 MEDIUM Web sites in less privileged Web content zones can navigate into Internet Zone is not disabled. This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. System AdministratorInformation Assurance OfficerECSC-1
    SV-25595r1_rule DTBI520 MEDIUM Web sites in less privileged Web content zones can navigate into Restricted Sites Zone is not disabled. This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. System AdministratorInformation Assurance OfficerECSC-1
    SV-25584r1_rule DTBI575 MEDIUM Allow binary and script behaviors are not disabled. This policy setting allows you to manage dynamic binary and script behaviors; components that encapsulate specific functionality for HTML elements to which they were attached. If you enable this policy setting, binary and script behaviors are available. If you select Administrator approved in the drop-down box, only behaviors listed in the Admin-approved Behaviors under Binary Behaviors Security Restriction policy are available. If you disable this policy setting, binary and script behaviors are not available unless applications have implemented a custom security manager. If you do not configure this policy setting, binary and script behaviors are available.System AdministratorInformation Assurance OfficerECSC-1
    SV-25586r2_rule DTBI580 MEDIUM Automatic prompting for file downloads is not disabled. This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Information Bar instead of the file download dialog. Users can then click the Information Bar to allow the file download prompt.System AdministratorInformation Assurance OfficerECSC-1
    SV-25598r1_rule DTBI590 MEDIUM Internet Explorer Processes for MIME handling is not enabled. (Reserved) Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. The Consistent MIME Handling\Internet Explorer Processes policy setting determines whether Internet Explorer requires that all file-type information provided by Web servers be consistent. For example, if the MIME type of a file is text/plain but the MIME data indicates that the file is really an executable file, Internet Explorer changes its extension to reflect this executable status. This capability helps ensure that executable code cannot masquerade as other types of data that may be trusted. If you enable this policy setting, Internet Explorer examines all received files and enforces consistent MIME data for them. If you disable or do not configure this policy setting, Internet Explorer does not require consistent MIME data for all received files and will use the MIME data provided by the file. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistent and properly labeled helps prevent malicious file downloads from infecting your network. This guide recommends you configure this policy as Enabled for all environments specified in this guide.System AdministratorInformation Assurance OfficerECSC-1
    SV-25601r1_rule DTBI595 MEDIUM Internet Explorer Processes for MIME sniffing is not enabled. (Reserved) MIME sniffing is the process of examining the content of a MIME file to determine its context — whether it is a data file, an executable file, or some other type of file. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a more dangerous file type. When set to Enabled, MIME sniffing will never promote a file of one type to a more dangerous file type. Disabling MIME sniffing configures Internet Explorer processes to allow a MIME sniff that promotes a file of one type to a more dangerous file type. For example, promoting a text file to an executable file is a dangerous promotion because any code in the supposed text file would be executed. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistently handled helps prevent malicious file downloads from infecting your network. This guide recommends you configure this policy as Enabled for all environments specified in this guide. Note: This setting works in conjunction with, but does not replace, the Consistent MIME Handling settings.System AdministratorInformation Assurance OfficerECSC-1
    SV-25648r1_rule DTBI600 MEDIUM Internet Explorer Processes for MK protocol is not enabled. (Explorer) The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. Setting this policy to Enabled blocks the MK protocol for Windows Explorer and Internet Explorer, which causes resources that use the MK protocol to fail. Disabling this setting allows applications to use the MK protocol API. Because the MK protocol is not widely used, it should be blocked wherever it is not needed. This guide recommends you configure this setting to Enabled to block the MK protocol unless it is specifically needed in your environment. Note: Because resources that use the MK protocol will fail when you deploy this setting, you should ensure that none of your applications use the MK protocol.System AdministratorECSC-1
    SV-25605r1_rule DTBI605 MEDIUM Internet Explorer Processes for MK protocol is not enabled. (IExplore) The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. Setting this policy to Enabled blocks the MK protocol for Windows Explorer and Internet Explorer, which causes resources that use the MK protocol to fail. Disabling this setting allows applications to use the MK protocol API. Because the MK protocol is not widely used, it should be blocked wherever it is not needed. This guide recommends you configure this setting to Enabled to block the MK protocol unless it is specifically needed in your environment. Note: Because resources that use the MK protocol will fail when you deploy this setting, you should ensure that none of your applications use the MK protocol.System AdministratorECSC-1
    SV-25649r1_rule DTBI610 MEDIUM Internet Explorer Processes for Zone Elevation is not enabled. (Reserved) Internet Explorer places restrictions on each Web page it opens that are dependent upon the location of the Web page (such as Internet Zone, Intranet Zone, or Local Machine Zone). Web pages on a local computer have the fewest security restrictions and reside in the Local Machine Zone, which makes the Local Machine Security Zone a prime target for malicious attackers. If you enable this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. This approach stops content running in one zone from gaining the elevated privileges of another zone. If you disable this policy setting, no zone receives such protection for Internet Explorer processes. Because of the severity and relative frequency of zone elevation attacks, this guide recommends that you configure this setting as Enabled in all environments.System AdministratorECSC-1
    SV-25653r1_rule DTBI630 MEDIUM Internet Explorer Processes for Download prompt is not enabled. (Reserved) In certain circumstances, Web sites can initiate file download prompts without interaction from users. This technique can allow Web sites to put unauthorized files on users' hard drives if they click the wrong button and accept the download. If you configure the Restrict File Download\Internet Explorer Processes policy setting to Enabled, file download prompts that are not user-initiated are blocked for Internet Explorer processes. If you configure this policy setting as Disabled, prompting will occur for file downloads that are not user-initiated for Internet Explorer processes. Note: This setting is configured as Enabled in all environments specified in this guide to help prevent attackers from placing arbitrary code on users' computers.System AdministratorECSC-1
    SV-25654r1_rule DTBI635 MEDIUM Internet Explorer Processes for Download prompt is not enabled. (Explorer) In certain circumstances, Web sites can initiate file download prompts without interaction from users. This technique can allow Web sites to put unauthorized files on users' hard drives if they click the wrong button and accept the download. If you configure the Restrict File Download\Internet Explorer Processes policy setting to Enabled, file download prompts that are not user-initiated are blocked for Internet Explorer processes. If you configure this policy setting as Disabled, prompting will occur for file downloads that are not user-initiated for Internet Explorer processes. Note: This setting is configured as Enabled in all environments specified in this guide to help prevent attackers from placing arbitrary code on users' computers.System AdministratorECSC-1
    SV-25655r1_rule DTBI640 MEDIUM Internet Explorer Processes for Download prompt is not enabled. (IExplore) In certain circumstances, Web sites can initiate file download prompts without interaction from users. This technique can allow Web sites to put unauthorized files on users' hard drives if they click the wrong button and accept the download. If you configure the Restrict File Download\Internet Explorer Processes policy setting to Enabled, file download prompts that are not user-initiated are blocked for Internet Explorer processes. If you configure this policy setting as Disabled, prompting will occur for file downloads that are not user-initiated for Internet Explorer processes. Note: This setting is configured as Enabled in all environments specified in this guide to help prevent attackers from placing arbitrary code on users' computers.System AdministratorECSC-1
    SV-25659r1_rule DTBI645 MEDIUM Internet Explorer Processes for restricting pop-up windows is not enabled. (Reserved) Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable Web sites will resize windows to either hide other windows or force you to interact with a window that contains malicious code. The Scripted Window Security Restrictions security feature restricts pop-up windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or hide other windows’ title and status bars. If you enable the Scripted Window Security Restrictions\Internet Explorer Processes policy setting, pop-up windows and other restrictions apply for Windows Explorer and Internet Explorer processes. If you disable or do not configure this policy setting, scripts can continue to create pop-up windows and windows that hide other windows. Recommend configuring this setting to Enabled to help prevent malicious Web sites from controlling your Internet Explorer windows or fooling users into clicking on the wrong window.System AdministratorECSC-1
    SV-25589r2_rule DTBI650 MEDIUM Run .NET Framework-reliant components not signed with Authenticode are not disabled. This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. If you disable this policy setting, Internet Explorer will not execute unsigned managed components. If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. System AdministratorECSC-1
    SV-25590r1_rule DTBI655 MEDIUM Run .NET Framework-reliant components signed with Authenticode are not disabled. This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. If you disable this policy setting, Internet Explorer will not execute unsigned managed components. If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. System AdministratorECSC-1
    SV-25591r2_rule DTBI670 MEDIUM Scripting of Java applets is not disabled. This policy setting allows you to manage whether applets are exposed to scripts within the zone. If you enable this policy setting, scripts can access applets automatically without user intervention. If you select Prompt in the drop-down box, users are queried to choose whether to allow scripts to access applets. If you disable this policy setting, scripts are prevented from accessing applets. If you do not configure this policy setting, scripts can access applets automatically without user intervention.System AdministratorECSC-1
    SV-25596r1_rule DTBI675 MEDIUM Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools is not disabled. This policy setting allows checking for updates for Internet Explorer from the specified URL, included by default in Internet Explorer. If you enable this policy setting, users will not be able to change the URL to be displayed for checking updates to Internet Explorer and Internet Tools. You must specify the URL to be displayed for checking updates to Internet Explorer and Internet Tools. If you disable or do not configure this policy setting, users will be able to change the URL to be displayed for checking updates to Internet Explorer and Internet Tools.System AdministratorECSC-1
    SV-25597r1_rule DTBI680 MEDIUM Turn off configuring the update check interval is not disabled. This setting specifies the update check interval. The default value is 30 days. If you enable this policy setting, the user will not be able to configure the update check interval. You have to specify the update check interval. If you disable or do not configure this policy setting, the user will have the freedom to configure the update check interval. System AdministratorECSC-1
    SV-25599r1_rule DTBI592 MEDIUM Internet Explorer Processes for MIME handling is not enabled. (Explorer) Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. The Consistent MIME Handling\Internet Explorer Processes policy setting determines whether Internet Explorer requires that all file-type information provided by Web servers be consistent. For example, if the MIME type of a file is text/plain but the MIME data indicates that the file is really an executable file, Internet Explorer changes its extension to reflect this executable status. This capability helps ensure that executable code cannot masquerade as other types of data that may be trusted. If you enable this policy setting, Internet Explorer examines all received files and enforces consistent MIME data for them. If you disable or do not configure this policy setting, Internet Explorer does not require consistent MIME data for all received files and will use the MIME data provided by the file. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistent and properly labeled helps prevent malicious file downloads from infecting your network. This guide recommends you configure this policy as Enabled for all environments specified in this guide.System AdministratorECSC-1
    SV-25600r1_rule DTBI594 MEDIUM Internet Explorer Processes for MIME handling is not enabled. (IExplore) Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. The Consistent MIME Handling\Internet Explorer Processes policy setting determines whether Internet Explorer requires that all file-type information provided by Web servers be consistent. For example, if the MIME type of a file is text/plain but the MIME data indicates that the file is really an executable file, Internet Explorer changes its extension to reflect this executable status. This capability helps ensure that executable code cannot masquerade as other types of data that may be trusted. If you enable this policy setting, Internet Explorer examines all received files and enforces consistent MIME data for them. If you disable or do not configure this policy setting, Internet Explorer does not require consistent MIME data for all received files and will use the MIME data provided by the file. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistent and properly labeled helps prevent malicious file downloads from infecting your network. This guide recommends you configure this policy as Enabled for all environments specified in this guide.System AdministratorECSC-1
    SV-25604r1_rule DTBI599 MEDIUM Internet Explorer Processes for MK protocol is not enabled. (Reserved) The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. Setting this policy to Enabled blocks the MK protocol for Windows Explorer and Internet Explorer, which causes resources that use the MK protocol to fail. Disabling this setting allows applications to use the MK protocol API. Because the MK protocol is not widely used, it should be blocked wherever it is not needed. This guide recommends you configure this setting to Enabled to block the MK protocol unless you specifically need it in your environment. Note: Because resources that use the MK protocol will fail when you deploy this setting, you should ensure that none of your applications use the MK protocol.System AdministratorECSC-1
    SV-25650r1_rule DTBI612 MEDIUM Internet Explorer Processes for Zone Elevation is not enabled. (Explorer) Internet Explorer places restrictions on each Web page it opens that are dependent upon the location of the Web page (such as Internet Zone, Intranet Zone, or Local Machine Zone). Web pages on a local computer have the fewest security restrictions and reside in the Local Machine Zone, which makes the Local Machine Security Zone a prime target for malicious attackers. If you enable this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. This approach stops content running in one zone from gaining the elevated privileges of another zone. If you disable this policy setting, no zone receives such protection for Internet Explorer processes. Because of the severity and relative frequency of zone elevation attacks, this guide recommends that you configure this setting as Enabled in all environments.System AdministratorECSC-1
    SV-25651r1_rule DTBI614 MEDIUM Internet Explorer Processes for Zone Elevation is not enabled. (IExplore) Internet Explorer places restrictions on each Web page it opens that are dependent upon the location of the Web page (such as Internet Zone, Intranet Zone, or Local Machine Zone). Web pages on a local computer have the fewest security restrictions and reside in the Local Machine Zone, which makes the Local Machine Security Zone a prime target for malicious attackers. If you enable this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. This approach stops content running in one zone from gaining the elevated privileges of another zone. If you disable this policy setting, no zone receives such protection for Internet Explorer processes. Because of the severity and relative frequency of zone elevation attacks, this guide recommends that you configure this setting as Enabled in all environments.System AdministratorECSC-1
    SV-25661r1_rule DTBI647 MEDIUM Internet Explorer Processes for restricting pop-up windows is not enabled. (Explorer) Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable Web sites will resize windows to either hide other windows or force you to interact with a window that contains malicious code. The Scripted Window Security Restrictions security feature restricts pop-up windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or hide other windows’ title and status bars. If you enable the Scripted Window Security Restrictions\Internet Explorer Processes policy setting, pop-up windows and other restrictions apply for Windows Explorer and Internet Explorer processes. If you disable or do not configure this policy setting, scripts can continue to create pop-up windows and windows that hide other windows. This guide recommends you configure this setting to Enabled to help prevent malicious Web sites from controlling your Internet Explorer windows or fooling users into clicking on the wrong window.System AdministratorECSC-1
    SV-25663r1_rule DTBI649 MEDIUM Internet Explorer Processes for restricting pop-up windows is not enabled. (IExplorer) Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable Web sites will resize windows to either hide other windows or force you to interact with a window that contains malicious code. The Scripted Window Security Restrictions security feature restricts pop-up windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or hide other windows’ title and status bars. If you enable the Scripted Window Security Restrictions\Internet Explorer Processes policy setting, pop-up windows and other restrictions apply for Windows Explorer and Internet Explorer processes. If you disable or do not configure this policy setting, scripts can continue to create pop-up windows and windows that hide other windows. This guide recommends you configure this setting to Enabled to help prevent malicious Web sites from controlling your Internet Explorer windows or fooling users into clicking on the wrong window.System AdministratorECSC-1
    SV-25666r1_rule DTBI690 MEDIUM Disable AutoComplete for forms is not enabled. This AutoComplete feature suggests possible matches when users are filling up forms. If you enable this setting, the user is not suggested matches when filling forms. The user cannot change it. If you disable this setting, the user is suggested possible matches when filling forms. The user cannot change it. If you do not configure this setting, the user has the freedom to turn on the auto-complete feature for forms. To display this option, the users open the Internet Options dialog box, click the Contents Tab and click the Settings button. System AdministratorECSC-1
    SV-25667r1_rule DTBI695 MEDIUM Disable external branding of Internet Explorer is not enabled. Prevents branding of Internet programs, such as customization of Internet Explorer and Outlook Express logos and title bars, by another party. If you enable this policy, it prevents customization of the browser by another party, such as an Internet service provider or Internet content provider. If you disable this policy or do not configure it, users could install customizations from another party-for example, when signing up for Internet services. This policy is intended for administrators who want to maintain a consistent browser across an organization.System AdministratorECSC-1
    SV-25558r1_rule DTBI715 MEDIUM Turn off Crash Detection is not enabled. The Turn off Crash Detection policy setting allows you to manage the crash detection feature of add-on management in Internet Explorer. If you enable this policy setting, a crash in Internet Explorer will be similar to one on a computer running Windows XP Professional Service Pack 1 and earlier: Windows Error Reporting will be invoked. If you disable this policy setting, the crash detection feature in add-on management will be functional. Because Internet Explorer crash report information could contain sensitive information from the computer's memory, this guide recommends you configure this option to Enabled unless you are experiencing frequent repeated crashes and need to report them for follow-up troubleshooting. In those cases, you could temporarily configure the setting to Disabled.System AdministratorECSC-1
    SV-25671r1_rule DTBI720 MEDIUM Turn off page transitions is not enabled. This policy setting specifies if, as you move from one Web page to another, Internet Explorer fades out of the page you are leaving and fades into the page to which you are going. If you enable this policy setting, page transitions will be turned off. The user cannot change this behavior. If you disable this policy setting, page transitions will be turned on. The user cannot change this behavior. If you do not configure this policy setting, the user can turn on or off page transitions.System AdministratorECSC-1
    SV-25670r1_rule DTBI725 MEDIUM Turn on the auto-complete feature for user names and passwords on forms are not disabled. This AutoComplete feature can remember and suggest User names and passwords on Forms. If you enable this setting, the user cannot change "User name and passwords on forms" or "prompt me to save passwords". The Auto Complete feature for User names and passwords on Forms will be turned on. You have to decide whether to select "prompt me to save passwords". If you disable this setting, the user cannot change "User name and passwords on forms" or "prompt me to save passwords". The Auto Complete feature for User names and passwords on Forms is turned off. The user also cannot opt to be prompted to save passwords. If you do not configure this setting, the user has the freedom of turning on Auto complete for User name and passwords on forms and the option of prompting to save passwords. To display this option, the users open the Internet Options dialog box, click the Contents Tab and click the Settings button.System AdministratorECSC-1
    SV-25602r1_rule DTBI596 MEDIUM Internet Explorer Processes for MIME sniffing is not enabled. (Explorer) MIME sniffing is the process of examining the content of a MIME file to determine its context — whether it is a data file, an executable file, or some other type of file. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a more dangerous file type. When set to Enabled, MIME sniffing will never promote a file of one type to a more dangerous file type. Disabling MIME sniffing configures Internet Explorer processes to allow a MIME sniff that promotes a file of one type to a more dangerous file type. For example, promoting a text file to an executable file is a dangerous promotion because any code in the supposed text file would be executed. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistently handled helps prevent malicious file downloads from infecting your network. This guide recommends you configure this policy as Enabled for all environments specified in this guide. Note: This setting works in conjunction with, but does not replace, the Consistent MIME handling settings.System AdministratorECSC-1
    SV-25603r1_rule DTBI597 MEDIUM Internet Explorer Processes for MIME sniffing is not enabled. (IExplore) MIME sniffing is the process of examining the content of a MIME file to determine its context — whether it is a data file, an executable file, or some other type of file. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a more dangerous file type. When set to Enabled, MIME sniffing will never promote a file of one type to a more dangerous file type. Disabling MIME sniffing configures Internet Explorer processes to allow a MIME sniff that promotes a file of one type to a more dangerous file type. For example, promoting a text file to an executable file is a dangerous promotion because any code in the supposed text file would be executed. MIME file-type spoofing is a potential threat to your organization. Ensuring that these files are consistently handled helps prevent malicious file downloads from infecting your network. This guide recommends you configure this policy as Enabled for all environments specified in this guide. Note: This setting works in conjunction with, but does not replace, the Consistent MIME handling settings.System AdministratorECSC-1
    SV-25825r1_rule DTBI010 MEDIUM Prevent performance of First Run Customize settings is not enabled. This policy setting prevents performance of the First Run Customize settings ability and controls what the user will see when they launch Internet Explorer for the first time after installation of Internet Explorer. If you enable this policy setting, users must make one of two choices: 1) Skip Customize Settings, and go directly to the user’s home page, or 2:) Skip Customize Settings, and go directly to the "Welcome to Internet Explorer" Web page. If you disable or do not configure this policy setting, users go through the regular first run process. System AdministratorInformation Assurance OfficerECSC-1
    SV-25652r1_rule DTBI300 MEDIUM Disable Configuring History - History setting is not set to 40 days. This setting specifies the number of days that Internet Explorer keeps track of the pages viewed in the History List. The delete Browsing History option can be accessed using Tools, Internet Options, General tab, and then click Settings under Browsing History. If you enable this policy setting, a user cannot set the number of days that Internet Explorer keeps track of the pages viewed in the History List. You must specify the number of days that Internet Explorer keeps track of the pages viewed in the History List. Users will not be able to delete browsing history. If you disable or do not configure this policy setting, a user can set the number of days that Internet Explorer tracks views of pages in the History List. Users can delete browsing history.System AdministratorECSC-1
    SV-25697r1_rule DTBI740 MEDIUM Turn off Managing SmartScreen Filter property is not properly set. This setting allows users to enable the SmartScreen Filter, which then warns if a Web site being visited is known for fraudulent attempts to gather personal information through "phishing" or is known to host malware.System AdministratorECSC-1
    SV-25699r2_rule DTBI750 LOW Include updated Web site lists from Microsoft is disabled. This policy controls the Web site compatibility lists provided by Microsoft. If you do not configure this setting, the Microsoft Web site list will not be active. The user can enable the functionality using the Compatibility View Settings dialog box.May adversely impact system.System AdministratorECSC-1
    SV-25701r1_rule DTBI760 MEDIUM Delete Browsing History on exit is disabled. Delete Browsing History on exit automatically deletes specified items when the last browser window closes. Disabling this function will prevent users from deleting their browsing history, which could be used to identify malicious Web sites and files that could later be used for anti-virus and intrusion detection system (IDS) signatures. Furthermore, preventing users from deleting browsing history could be used to identify abusive web surfing on government systems.System AdministratorECSC-1
    SV-25703r1_rule DTBI770 MEDIUM Prevent Deleting Web sites that the User has Visited is enabled. This policy prevents users from deleting the history of Web sites the user has visited. If you do not configure this policy setting, the user will be able to select whether to delete or preserve Web sites the user visited when the user clicks Delete.System AdministratorECSC-1
    SV-25705r1_rule DTBI780 MEDIUM Turn off InPrivate Browsing is enabled. InPrivate Browsing lets you control whether or not Internet Explorer 8 saves your browsing history, cookies, and other data. The InPrivate Browsing feature in Internet Explorer 8 makes browser privacy easy by not storing history, cookies, temporary Internet files, or other data. If you do not configure this setting, InPrivate Browsing can be turned on or off through the registry.System AdministratorECSC-1
    SV-25709r1_rule DTBI800 MEDIUM Allow scripting of Internet Explorer web browser control property is set (Internet Zone). This policy setting controls whether a page may control embedded WebBrowser Controls via script. If you do not configure this policy setting, script access to the WebBrowser Control can be enabled or disabled by the user. By default, script access to the WebBrowser control is only allowed in the Local Machine and Intranet Zones.System AdministratorECSC-1
    SV-25711r1_rule DTBI810 MEDIUM Include local directory path when uploading files to a server property is properly set. This policy setting controls whether or not the local path information will be sent when uploading a file via a HTML form. If the local path information is sent, some information may be unintentionally revealed to the server. If you do not configure this policy setting, the user can choose whether path information will be sent when uploading a file via a form. By default, path information will be sent.System AdministratorECSC-1
    SV-25713r1_rule DTBI820 MEDIUM Launching programs and unsafe files property is properly set (Internet Zone). This policy setting controls whether or not the “Open File – Security Warning” prompt is shown when launching executables or other unsafe files. If you do not configure this policy setting, users can configure the prompt behavior. By default, execution is blocked in the Restricted Zone, enabled in the Intranet and Local Computer Zone, and set to prompt in the Internet and Trusted Zones.System AdministratorECSC-1
    SV-25715r1_rule DTBI830 MEDIUM Only allow approved domains to use ActiveX controls without prompt property is properly set (Internet Zone). This policy setting controls whether or not the user is prompted to allow ActiveX controls to run on Web sites other than the Web site that installed the ActiveX control.System AdministratorECSC-1
    SV-25717r1_rule DTBI840 MEDIUM Turn on Cross-Site Scripting (XSS) Filter property is properly set (Internet Zone). The Cross-Site Scripting (XSS) Filter is designed to prevent users from becoming victims of unintentional information disclosure. This setting controls if the Cross-Site Scripting (XSS) Filter detects and prevents cross-site script injection into Web sites in this zone.System AdministratorECSC-1
    SV-25719r1_rule DTBI850 MEDIUM Allow scripting of Internet Explorer web browser control property is properly configured (Restricted Sites Zone). This policy setting controls whether a page may control embedded WebBrowser Controls via script. If you do not configure this policy setting, script access to the WebBrowser Control can be enabled or disabled by the user. By default, script access to the WebBrowser Control is only allowed in the Local Machine and Intranet Zones.System AdministratorECSC-1
    SV-25721r1_rule DTBI860 MEDIUM Include local directory path when uploading files to a server is properly set (Restricted Sites Zone). This policy setting controls whether or not the local path information will be sent when uploading a file via a HTML form. If the local path information is sent, some information may be unintentionally revealed to the server. If you do not configure this policy setting, the user can choose whether path information will be sent when uploading a file via a form. By default, path information will be sent.System AdministratorECSC-1
    SV-25723r1_rule DTBI870 MEDIUM Launching programs and unsafe files property is properly set (Restricted Sites Zone). This policy setting controls whether or not the “Open File – Security Warning” prompt is shown when launching executables or other unsafe files. If you do not configure this policy setting, users can configure the prompt behavior. By default, execution is blocked in the Restricted Zone, enabled in the Intranet and Local Computer Zones, and set to prompt in the Internet and Trusted Zones.System AdministratorECSC-1
    SV-25725r1_rule DTBI880 MEDIUM Only allow approved domains to use ActiveX controls without prompt property is properly set (Restricted Sites Zone). This policy setting controls whether or not the user is prompted to allow ActiveX controls to run on Web sites other than the Web site that installed the ActiveX control.System AdministratorECSC-1
    SV-25727r1_rule DTBI890 MEDIUM Turn on Cross-Site Scripting (XSS) Filter property is properly set (Restricted Sites Zone). This setting controls if the Cross-Site Scripting (XSS) Filter detects and prevents cross-site script injection into Web sites in this zone.System AdministratorECSC-1
    SV-25809r1_rule DTBI900 MEDIUM Internet Explorer Processes Restrict ActiveX Install (Reserved) property is properly set. This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes. If you do not configure this policy setting, the user’s preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes.System AdministratorECSC-1
    SV-26380r1_rule DTBI910 MEDIUM Allow status bar updates via script (Internet Zone) property is properly set. This policy setting allows you to manage whether script is allowed to update the status bar within the zone.System AdministratorECSC-1
    SV-26382r1_rule DTBI920 MEDIUM Run .NET Framework-reliant components not signed with Authenticode (Internet Zone) property is properly set. This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link.System AdministratorECSC-1
    SV-26386r1_rule DTBI930 MEDIUM Run .NET Framework-reliant components signed with Authenticode (Internet Zone) property is properly set. This policy setting allows you to manage whether .NET Framework components that are signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link.System AdministratorECSC-1
    SV-26389r1_rule DTBI940 MEDIUM Allow Scriptlets (Restricted Sites Zone) property is properly set. This policy setting allows you to manage whether scriptlets can be allowed.System AdministratorECSC-1
    SV-26392r1_rule DTBI950 MEDIUM Allow status bar updates via script (Restricted Sites Zone) property is properly set. This policy setting allows you to manage whether script is allowed to update the status bar within the zone.System AdministratorECSC-1
    SV-27076r1_rule DTBI1010 MEDIUM Internet Explorer Processes Restrict ActiveX Install (Explorer) property is properly set. This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes. If you do not configure this policy setting, the user’s preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes.System AdministratorECSC-1
    SV-27078r1_rule DTBI1020 MEDIUM Internet Explorer Processes Restrict ActiveX Install (IExplorer) property is properly set. This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes. If you do not configure this policy setting, the user’s preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes.System AdministratorECSC-1
    SV-44920r3_rule DTBI765 MEDIUM Suggested Sites functionality is not disabled. This policy setting controls the Suggested Sites feature, which recommends sites based on the user's browsing activity. Suggested Sites reports a user's browsing history to Microsoft to store and monitor user page activity to suggest sites the user might want to visit. If you enable this policy setting, the user will not be prompted to enable the Suggested Sites and the user's browsing activities will be sent and stored online to produce suggestions. If you disable this policy setting, the entry points and functionality associated with this feature will be disabled.System AdministratorECSC-1
    SV-44837r1_rule DTBI775 MEDIUM Automatic checking for Internet Explorer updates is not disabled. This policy setting allows you to manage whether Internet Explorer checks the Internet for newer versions. When Internet Explorer is set to do this, the checks occur approximately every 30 days, and users are prompted to install new versions as they become available. If you enable this policy setting, Internet Explorer checks the Internet for a new version approximately every 30 days and prompts the user to download new versions when they are available. Newer versions might not comply with the Internet Explorer version requirements of the organization. System AdministratorECSC-1
    SV-44923r1_rule DTBI805 MEDIUM ActiveX opt-in prompt is not disabled. This policy setting allows you to turn off the ActiveX opt-in prompt. The ActiveX opt-in prevents Web sites from loading any COM object without prior approval. If a page attempts to load a COM object that Internet Explorer has not used before, an Information bar will appear asking the user for approval. If you enable this policy setting, the ActiveX opt-in prompt will not appear. Internet Explorer does not ask the user for permission to load a control, and will load the ActiveX if it passes all other internal security checks. If you disable or do not configure this policy setting the ActiveX opt-in prompt will appear.System AdministratorECSC-1
    SV-44854r2_rule DTBI815 MEDIUM Internet Explorer Processes for Information bars are enforced (Reserved). This policy setting allows you to manage whether the Information bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Information bar is displayed for Internet Explorer processes. If you enable this policy setting, the Information bar will be displayed for Internet Explorer Processes. If you disable this policy setting, the Information bar will not be displayed for Internet Explorer processes. If you do not configure this policy setting, the Information bar will be displayed for Internet Explorer Processes.System AdministratorECSC-1
    SV-44908r2_rule DTBI825 MEDIUM Internet Explorer Processes for Information bars is not enforced (Explorer). This policy setting allows you to manage whether the Information bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the information bar is displayed for Internet Explorer processes. If you enable this policy setting, the Information bar will be displayed for Internet Explorer Processes. If you disable this policy setting, the Information bar will not be displayed for Internet Explorer processes. If you do not configure this policy setting, the Information bar will be displayed for Internet Explorer ProcessesSystem AdministratorECSC-1
    SV-44910r2_rule DTBI835 MEDIUM Internet Explorer Processes for Information bars is not enforced (IExplore). This policy setting allows you to manage whether the Information bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Information bar is displayed for Internet Explorer processes. If you enable this policy setting, the Information bar will be displayed for Internet Explorer processes. If you disable this policy setting, the Information bar will not be displayed for Internet Explorer processes. If you do not configure this policy setting, the Information bar will be displayed for Internet Explorer processes.System AdministratorECSC-1
    SV-43162r3_rule DTBI018 MEDIUM Check for publishers certificate revocation must be enforced. Check for publisher's certificate revocation options should be enforced to ensure all PKI signed objects are validated.System AdministratorECSC-1