Microsoft InfoPath 2007
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V4R10). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 26 rules matched cleanly.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - InfoPath
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-18182r1_rule
Checks: C-17857r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16959r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” will be set to “Enabled” and ‘spDesign.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - InfoPath
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-18189r1_rule
Checks: C-17871r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16965r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘spDesign.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - InfoPath
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-18204r1_rule
Checks: C-17887r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17051r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘spDesign.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - InfoPath
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-18601r1_rule
Checks: C-18843r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17443r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘spDesign.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - InfoPath
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-18214r1_rule
Checks: C-17898r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘spDesign.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17059r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘spDesign.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131 - InfoPath
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-18221r1_rule
Checks: C-17914r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-17081r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO157 - InfoPath
- Vuln IDs
-
- V-17576
- Rule IDs
-
- SV-18691r1_rule
Checks: C-18877r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value GradualUpgradeRedirection is REG_DWORD = 2, this is not a finding.
Fix: F-17494r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO161 - InfoPath
- Vuln IDs
-
- V-17577
- Rule IDs
-
- SV-18693r1_rule
Checks: C-18878r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-17495r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO162 - InfoPath
- Vuln IDs
-
- V-17578
- Rule IDs
-
- SV-18695r1_rule
Checks: C-18879r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-17497r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO163 - InfoPath
- Vuln IDs
-
- V-17579
- Rule IDs
-
- SV-18697r1_rule
Checks: C-18880r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Trusted Site is REG_DWORD = 0, this is not a finding.
Fix: F-17498r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO167 - InfoPath
- Vuln IDs
-
- V-17580
- Rule IDs
-
- SV-18699r1_rule
Checks: C-18881r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EMailFormsRunCodeAndScript is REG_DWORD = 1, this is not a finding.
Fix: F-17499r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO175 - InfoPath
- Vuln IDs
-
- V-17582
- Rule IDs
-
- SV-18703r1_rule
Checks: C-18883r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value CodeAllowed is REG_DWORD = 0, this is not a finding.
Fix: F-17501r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO176 - InfoPath
- Vuln IDs
-
- V-17611
- Rule IDs
-
- SV-18745r1_rule
Checks: C-18909r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EmailFormsBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17525r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO174 - InfoPath
- Vuln IDs
-
- V-17646
- Rule IDs
-
- SV-18793r1_rule
Checks: C-18921r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value IRMAllowed is REG_DWORD = 1, this is not a finding.
Fix: F-17548r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO169 - InfoPath
- Vuln IDs
-
- V-17654
- Rule IDs
-
- SV-18804r1_rule
Checks: C-18925r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value CacheMailXSN is REG_DWORD = 0, this is not a finding.
Fix: F-17552r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO173 - InfoPath
- Vuln IDs
-
- V-17655
- Rule IDs
-
- SV-18806r1_rule
Checks: C-18926r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17553r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO172 - InfoPath
- Vuln IDs
-
- V-17656
- Rule IDs
-
- SV-18808r1_rule
Checks: C-18927r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableInternetEMailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17554r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO171 - InfoPath
- Vuln IDs
-
- V-17657
- Rule IDs
-
- SV-18810r1_rule
Checks: C-18928r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableRestrictedEMailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17555r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO159 - InfoPath
- Vuln IDs
-
- V-17658
- Rule IDs
-
- SV-18812r1_rule
Checks: C-18929r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security\ Criteria: If the value RunFullTrustSolutions is REG_DWORD = 0, this is not a finding.
Fix: F-17556r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO158 - InfoPath
- Vuln IDs
-
- V-17663
- Rule IDs
-
- SV-18822r1_rule
Checks: C-18934r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value AllowInternetSolutions is REG_DWORD = 0, this is not a finding.
Fix: F-17561r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO168 - InfoPath
- Vuln IDs
-
- V-17667
- Rule IDs
-
- SV-18830r1_rule
Checks: C-18938r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value MailXSNwithXML is REG_DWORD = 0, this is not a finding.
Fix: F-17565r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO170 - InfoPath
- Vuln IDs
-
- V-17668
- Rule IDs
-
- SV-18832r1_rule
Checks: C-18939r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath Criteria: If the value DisableInfoPath2003EmailForms is REG_DWORD = 1, this is not a finding.
Fix: F-17566r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO164 - InfoPath
- Vuln IDs
-
- V-17745
- Rule IDs
-
- SV-18930r1_rule
Checks: C-19007r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value InfoPathBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17644r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO165 - InfoPath
- Vuln IDs
-
- V-17746
- Rule IDs
-
- SV-18932r1_rule
Checks: C-19008r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EditorActiveXBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17645r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO156 - InfoPath
- Vuln IDs
-
- V-17758
- Rule IDs
-
- SV-18954r1_rule
Checks: C-19021r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Editor\Offline Criteria: If the value CachedModeStatus is REG_DWORD = 2, this is not a finding
Fix: F-17657r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO160 - InfoPath
- Vuln IDs
-
- V-17764
- Rule IDs
-
- SV-18966r1_rule
Checks: C-19027r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-17663r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”.