Microsoft InfoPath 2007 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1 ✎ 26
Comparison against the immediately-prior release (V4R12). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-25884 High An unsupported Microsoft Office version must not be installed.
Content changes 26
- V-17173 Medium description Disable user name and password syntax from being used in URLs
- V-17174 Medium description Enable IE Bind to Object functionality for instances of IE launched from InfoPath.
- V-17175 Medium description Evaluate Saved from URL mark when launched from InfoPath.
- V-17183 Medium description Block navigation to URL embedded in Office products to protect against attack by malformed URL.
- V-17184 Medium description Block pop-ups for links that invoke instances of IE from within InfoPath.
- V-17187 Medium description Disable Trust Bar Notification for unsigned application add-ins - InfoPath
- V-17576 Medium description Block redirection behavior for upgraded web sites by SharePoint - Infopath.
- V-17577 Medium description Control "open forms" behavior for Internet Security zone - InfoPath
- V-17578 Medium description Control behavior when opening forms in the Intranet Security Zone - InfoPath
- V-17579 Medium description Control behavior when opening eMail forms in the Trusted Site Security Zone - InfoPath
- V-17580 Medium description Control Forms Opening behavior for EMail forms containing code or scripts - InfoPath.
- V-17582 Medium description Enable the Restriction on adding custom code to InfoPath forms.
- V-17611 Medium description Email with InfoPath forms to show UI to recipients.
- V-17646 Medium description Disable the Information Rights Management feature for InfoPath.
- V-17654 Medium description Disable dynamic caching of the form template in InfoPath eMail forms.
- V-17655 Medium description Disable email forms from the Full Trust Security Zone - InfoPath
- V-17656 Medium description Disable eMail forms from the Internet Security Zone for InfoPath.
- V-17657 Medium description Disable eMail forms running in Restricted Security Level - InfoPath.
- V-17658 Medium description Disable Fully Trusted Solutions access to computers - InfoPath
- V-17663 Medium description Disable opening of solutions from the Internet Security Zone - InfoPath.
- V-17667 Medium description Disable sending the form template with the eMail form in InfoPath.
- V-17668 Medium description Disable sending "InfoPath 2003" forms as email forms in InfoPath 2007.
- V-17745 Medium description Beaconing UI shown for forms opened in InfoPath - InfoPath
- V-17746 Medium description Beaconing UI forms opened in Editor ActiveX - InfoPath
- V-17758 Medium description Offline Mode enabled to cache queries for offline mode.
- V-17764 Medium description Prevent unsafe file types to be attached to InfoPath forms.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - InfoPath
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-18182r2_rule
Checks: C-17857r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings -> IE Security “Disable user name and password” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16959r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Disable user name and password” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - InfoPath
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-18189r2_rule
Checks: C-17871r3_chk
Valid the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16965r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - InfoPath
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-18204r2_rule
Checks: C-17887r3_chk
Validate the policy value for Computer Configuration -> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17051r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - InfoPath
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-18601r2_rule
Checks: C-18843r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17443r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - InfoPath
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-18214r2_rule
Checks: C-17898r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” is set to “Enabled” and "spDesign.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value spDesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17059r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” to “Enabled” and select the "spDesign.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131 - InfoPath
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-18221r1_rule
Checks: C-17914r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-17081r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO157 - InfoPath
- Vuln IDs
-
- V-17576
- Rule IDs
-
- SV-18691r1_rule
Checks: C-18877r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value GradualUpgradeRedirection is REG_DWORD = 2, this is not a finding.
Fix: F-17494r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior for Windows SharePoint Services gradual upgrade” will be set to “Enabled (Block all redirections)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO161 - InfoPath
- Vuln IDs
-
- V-17577
- Rule IDs
-
- SV-18693r1_rule
Checks: C-18878r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-17495r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Internet security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO162 - InfoPath
- Vuln IDs
-
- V-17578
- Rule IDs
-
- SV-18695r1_rule
Checks: C-18879r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-17497r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Intranet security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO163 - InfoPath
- Vuln IDs
-
- V-17579
- Rule IDs
-
- SV-18697r1_rule
Checks: C-18880r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Open Behaviors Criteria: If the value Trusted Site is REG_DWORD = 0, this is not a finding.
Fix: F-17498r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Control behavior when opening forms in the Trusted Site security zone” will be set to “Enabled (Block)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO167 - InfoPath
- Vuln IDs
-
- V-17580
- Rule IDs
-
- SV-18699r1_rule
Checks: C-18881r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EMailFormsRunCodeAndScript is REG_DWORD = 1, this is not a finding.
Fix: F-17499r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Control behavior when opening InfoPath e-mail forms containing code or script” will be set to “Enabled (Prompt before running)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO175 - InfoPath
- Vuln IDs
-
- V-17582
- Rule IDs
-
- SV-18703r1_rule
Checks: C-18883r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value CodeAllowed is REG_DWORD = 0, this is not a finding.
Fix: F-17501r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Custom code” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO176 - InfoPath
- Vuln IDs
-
- V-17611
- Rule IDs
-
- SV-18745r1_rule
Checks: C-18909r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EmailFormsBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17525r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Miscellaneous “Email Forms Beaconing UI” will be set to “Enabled (Always show UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO174 - InfoPath
- Vuln IDs
-
- V-17646
- Rule IDs
-
- SV-18793r1_rule
Checks: C-18921r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Designer\RestrictedFeatures Criteria: If the value IRMAllowed is REG_DWORD = 1, this is not a finding.
Fix: F-17548r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Restricted Features “Information Rights Management” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO169 - InfoPath
- Vuln IDs
-
- V-17654
- Rule IDs
-
- SV-18804r1_rule
Checks: C-18925r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value CacheMailXSN is REG_DWORD = 0, this is not a finding.
Fix: F-17552r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable dynamic caching of the form template in InfoPath e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO173 - InfoPath
- Vuln IDs
-
- V-17655
- Rule IDs
-
- SV-18806r1_rule
Checks: C-18926r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17553r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Full Trust security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO172 - InfoPath
- Vuln IDs
-
- V-17656
- Rule IDs
-
- SV-18808r1_rule
Checks: C-18927r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableInternetEMailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17554r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms from the Internet security zone” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO171 - InfoPath
- Vuln IDs
-
- V-17657
- Rule IDs
-
- SV-18810r1_rule
Checks: C-18928r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EnableRestrictedEMailForms is REG_DWORD = 0, this is not a finding.
Fix: F-17555r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable e-mail forms running in restricted security level” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO159 - InfoPath
- Vuln IDs
-
- V-17658
- Rule IDs
-
- SV-18812r1_rule
Checks: C-18929r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security\ Criteria: If the value RunFullTrustSolutions is REG_DWORD = 0, this is not a finding.
Fix: F-17556r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable fully trusted solutions full access to computer” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO158 - InfoPath
- Vuln IDs
-
- V-17663
- Rule IDs
-
- SV-18822r1_rule
Checks: C-18934r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value AllowInternetSolutions is REG_DWORD = 0, this is not a finding.
Fix: F-17561r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Disable opening of solutions from the Internet security zone” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO168 - InfoPath
- Vuln IDs
-
- V-17667
- Rule IDs
-
- SV-18830r1_rule
Checks: C-18938r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Deployment Criteria: If the value MailXSNwithXML is REG_DWORD = 0, this is not a finding.
Fix: F-17565r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending form template with e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO170 - InfoPath
- Vuln IDs
-
- V-17668
- Rule IDs
-
- SV-18832r1_rule
Checks: C-18939r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath Criteria: If the value DisableInfoPath2003EmailForms is REG_DWORD = 1, this is not a finding.
Fix: F-17566r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> InfoPath e-mail forms “Disable sending InfoPath 2003 Forms as e-mail forms” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO164 - InfoPath
- Vuln IDs
-
- V-17745
- Rule IDs
-
- SV-18930r1_rule
Checks: C-19007r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value InfoPathBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17644r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath” will be set to “Enabled (Always show beaconing UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO165 - InfoPath
- Vuln IDs
-
- V-17746
- Rule IDs
-
- SV-18932r1_rule
Checks: C-19008r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value EditorActiveXBeaconingUI is REG_DWORD = 1, this is not a finding.
Fix: F-17645r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Beaconing UI for forms opened in InfoPath Editor ActiveX” will be set to “Enabled (Always show beaconing UI)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO156 - InfoPath
- Vuln IDs
-
- V-17758
- Rule IDs
-
- SV-18954r1_rule
Checks: C-19021r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Editor\Offline Criteria: If the value CachedModeStatus is REG_DWORD = 2, this is not a finding
Fix: F-17657r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Tools \ Options -> Advanced -> Offline “Offline Mode status” will be set to “Enabled (Enabled, InfoPath not in Offline Mode)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO160 - InfoPath
- Vuln IDs
-
- V-17764
- Rule IDs
-
- SV-18966r1_rule
Checks: C-19027r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\InfoPath\Security Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-17663r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office InfoPath 2007 -> Security -> “Prevent users from allowing unsafe file types to be attached to forms” will be set to “Enabled”.
- RMF Control
- Severity
- H
- CCI
- Version
- DTOO287
- Vuln IDs
-
- V-25884
- Rule IDs
-
- SV-32370r3_rule
Checks: C-32765r4_chk
To determine what service pack level is installed, start the Office application. Click on the Office Menu Button (upper left), click "Options" at the bottom of the menu, and select "Resources" from the left column. The version number will be displayed alongside the "About" button on the right-hand side display. If the "About" box information displays an Office 2007 version, this is a finding.
Fix: F-28840r3_fix
Upgrade to Office 2010, Office 2013, or Office 2016.