Microsoft InfoPath 2007
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 5
Comparison against the immediately-prior release (V4R11). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 5
- V-17173 Medium descriptioncheckfix Disable user name and password syntax from being used in URLs
- V-17174 Medium descriptioncheckfix Enable IE Bind to Object functionality for instances of IE launched from InfoPath.
- V-17175 Medium descriptioncheckfix Evaluate Saved from URL mark when launched from InfoPath.
- V-17183 Medium descriptioncheckfix Block navigation to URL embedded in Office products to protect against attack by malformed URL.
- V-17184 Medium descriptioncheckfix Block pop-ups for links that invoke instances of IE from within InfoPath.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - InfoPath
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-18182r2_rule
Checks: C-17857r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings -> IE Security “Disable user name and password” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16959r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Disable user name and password” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - InfoPath
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-18189r2_rule
Checks: C-17871r3_chk
Valid the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16965r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - InfoPath
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-18204r2_rule
Checks: C-17887r3_chk
Validate the policy value for Computer Configuration -> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17051r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - InfoPath
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-18601r2_rule
Checks: C-18843r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17443r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - InfoPath
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-18214r2_rule
Checks: C-17898r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17059r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131 - InfoPath
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-18221r1_rule
Checks: C-17914r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-17081r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO157 - InfoPath
- Vuln IDs
-
- V-17576
- Rule IDs
-
- SV-18691r1_rule
Checks: C-18877r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value GradualUpgradeRedirection is REG_DWORD = 2, this is not a finding.
Fix: F-17494r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO161 - InfoPath
- Vuln IDs
-
- V-17577
- Rule IDs
-
- SV-18693r1_rule
Checks: C-18878r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-17495r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO162 - InfoPath
- Vuln IDs
-
- V-17578
- Rule IDs
-
- SV-18695r1_rule
Checks: C-18879r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-17497r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO163 - InfoPath
- Vuln IDs
-
- V-17579
- Rule IDs
-
- SV-18697r1_rule
Checks: C-18880r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Trusted Site is REG_DWORD = 0, this is not a finding.
Fix: F-17498r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO167 - InfoPath
- Vuln IDs
-
- V-17580
- Rule IDs
-
- SV-18699r1_rule
Checks: C-18881r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EMailFormsRunCodeAndScript is REG_DWORD = 1, this is not a finding.
Fix: F-17499r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO175 - InfoPath
- Vuln IDs
-
- V-17582
- Rule IDs
-
- SV-18703r1_rule
Checks: C-18883r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value CodeAllowed is REG_DWORD = 0, this is not a finding.
Fix: F-17501r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO176 - InfoPath
- Vuln IDs
-
- V-17611
- Rule IDs
-
- SV-18745r1_rule
Checks: C-18909r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EmailFormsBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17525r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO174 - InfoPath
- Vuln IDs
-
- V-17646
- Rule IDs
-
- SV-18793r1_rule
Checks: C-18921r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value IRMAllowed is REG_DWORD = 1, this is not a finding.
Fix: F-17548r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO169 - InfoPath
- Vuln IDs
-
- V-17654
- Rule IDs
-
- SV-18804r1_rule
Checks: C-18925r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value CacheMailXSN is REG_DWORD = 0, this is not a finding.
Fix: F-17552r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO173 - InfoPath
- Vuln IDs
-
- V-17655
- Rule IDs
-
- SV-18806r1_rule
Checks: C-18926r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17553r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO172 - InfoPath
- Vuln IDs
-
- V-17656
- Rule IDs
-
- SV-18808r1_rule
Checks: C-18927r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableInternetEMailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17554r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO171 - InfoPath
- Vuln IDs
-
- V-17657
- Rule IDs
-
- SV-18810r1_rule
Checks: C-18928r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableRestrictedEMailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17555r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO159 - InfoPath
- Vuln IDs
-
- V-17658
- Rule IDs
-
- SV-18812r1_rule
Checks: C-18929r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security\ Criteria: If the value RunFullTrustSolutions is REG_DWORD = 0, this is not a finding.
Fix: F-17556r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO158 - InfoPath
- Vuln IDs
-
- V-17663
- Rule IDs
-
- SV-18822r1_rule
Checks: C-18934r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value AllowInternetSolutions is REG_DWORD = 0, this is not a finding.
Fix: F-17561r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO168 - InfoPath
- Vuln IDs
-
- V-17667
- Rule IDs
-
- SV-18830r1_rule
Checks: C-18938r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value MailXSNwithXML is REG_DWORD = 0, this is not a finding.
Fix: F-17565r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO170 - InfoPath
- Vuln IDs
-
- V-17668
- Rule IDs
-
- SV-18832r1_rule
Checks: C-18939r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath Criteria: If the value DisableInfoPath2003EmailForms is REG_DWORD = 1, this is not a finding.
Fix: F-17566r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO164 - InfoPath
- Vuln IDs
-
- V-17745
- Rule IDs
-
- SV-18930r1_rule
Checks: C-19007r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value InfoPathBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17644r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO165 - InfoPath
- Vuln IDs
-
- V-17746
- Rule IDs
-
- SV-18932r1_rule
Checks: C-19008r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EditorActiveXBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17645r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO156 - InfoPath
- Vuln IDs
-
- V-17758
- Rule IDs
-
- SV-18954r1_rule
Checks: C-19021r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Editor\Offline Criteria: If the value CachedModeStatus is REG_DWORD = 2, this is not a finding
Fix: F-17657r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO160 - InfoPath
- Vuln IDs
-
- V-17764
- Rule IDs
-
- SV-18966r1_rule
Checks: C-19027r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-17663r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”.