Microsoft Internet Explorer 10 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1 ✎ 5
Comparison against the immediately-prior release (V1R11). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-64727 High The installed version of IE must be a supported version.
Content changes 5
- V-15521 Medium description XAML files must be disallowed (Internet zone).
- V-15522 Medium description XAML files must be disallowed (Restricted Sites zone).
- V-15533 Medium description Websites in less privileged web content zones must be prevented from navigating into the Internet zone.
- V-15534 Medium description Websites in less privileged web content zones must be prevented from navigating into the Restricted Sites zone.
- V-22108 Medium checkfix Managing SmartScreen Filter use must be enforced.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI320
- Vuln IDs
-
- V-3427
- Rule IDs
-
- SV-45220r1_rule
Checks: C-42568r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Use only machine settings" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value Security_HKLM_only is REG_DWORD = 1, this is not a finding.
Fix: F-38616r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Use only machine settings" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI319
- Vuln IDs
-
- V-3428
- Rule IDs
-
- SV-45218r1_rule
Checks: C-42566r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to change policies" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value Security_options_edit is REG_DWORD = 1, this is not a finding.
Fix: F-38614r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to change policies" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI318
- Vuln IDs
-
- V-3429
- Rule IDs
-
- SV-45221r1_rule
Checks: C-42569r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to add/delete sites" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value Security_zones_map_edit is REG_DWORD = 1, this is not a finding.
Fix: F-38617r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to add/delete sites" to "Enabled".
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI367
- Vuln IDs
-
- V-3430
- Rule IDs
-
- SV-45219r1_rule
Checks: C-42567r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Make proxy settings per-machine (rather than per user)" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value ProxySettingsPerUser is REG_DWORD = 1, this is not a finding.
Fix: F-38615r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Make proxy settings per-machine (rather than per user)" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI001
- Vuln IDs
-
- V-6228
- Rule IDs
-
- SV-72161r2_rule
Checks: C-170r4_chk
The policy for User Configuration -> Policies -> Administrative Templates -> Windows Components -> Internet Explorer "Disable changing home page settings" must be "Enable" and specify the URL for the home page. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Microsoft\Internet Explorer\Main Criteria: If the value Start Page is about:blank or a trusted site this is not a finding.
Fix: F-131r3_fix
Set the policy for User Configuration -> Policies -> Administrative Templates -> Windows Components -> Internet Explorer "Disable changing home page settings" to "Enable" and specify the URL for the home page.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI014
- Vuln IDs
-
- V-6238
- Rule IDs
-
- SV-45415r6_rule
Checks: C-42764r17_chk
Open Internet Explorer. From the menu bar, select "Tools". From the "Tools" drop-down menu, select "Internet Options". From the "Internet Options" window, select the "Advanced" tab, from the "Advanced" tab window scroll down to the "Security" category. Verify a checkmark is placed in the "Use TLS 1.0 or higher" check boxes. Verify there is not a check placed in the check box for "Use SSL 2.0" or "Use SSL 3.0". If "Use SSL 2.0" or "Use SSL 3.0" is checked, then this is a finding. 1) The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer>> Internet Control Panel>> Advanced Page >> "Turn off Encryption Support" must be "Enabled" and ensure the option selected is "Use TLS 1.0 or higher" from the drop-down box. If the selected options contain "SSL 2.0" or "SSL 3.0", then this is a finding. 2) The policy value for Computer Configuration >> Administrative Templates >> Internet Explorer >> Security Features >> "Allow fallback to SSL 3.0 (Internet Explorer)" must be selected.
Fix: F-38812r12_fix
Open Internet Explorer. From the menu bar, select "Tools". From the "Tools" drop-down menu, select "Internet Options". From the "Internet Options" window, select the "Advanced" tab, from the "Advanced" tab window scroll down to the "Security" category. Place a checkmark in "Use TLS 1.0 or higher" check boxes. Uncheck "Use SSL 2.0" and "Use SSL 3.0" options. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Advanced Page >> "Turn off Encryption Support" to "Enabled", and select "Use TLS 1.0 or higher" from the drop-down box. Ensure the options do not include "SSL 2.0" or "SSL 3.0".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI015
- Vuln IDs
-
- V-6239
- Rule IDs
-
- SV-45417r1_rule
Checks: C-42768r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page "Turn on certificate address mismatch warning" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value WarnOnBadCertRecving is REG_DWORD = 1, this is not a finding.
Fix: F-38815r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page "Turn on certificate address mismatch warning" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI022
- Vuln IDs
-
- V-6243
- Rule IDs
-
- SV-75313r1_rule
Checks: C-42756r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download signed ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1001 is REG_DWORD = 3, this is not a finding.
Fix: F-38804r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download signed ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI023
- Vuln IDs
-
- V-6244
- Rule IDs
-
- SV-45408r1_rule
Checks: C-42757r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download unsigned ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1004 is REG_DWORD = 3, this is not a finding.
Fix: F-38805r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download unsigned ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI024
- Vuln IDs
-
- V-6245
- Rule IDs
-
- SV-45410r1_rule
Checks: C-42760r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Initialize and script ActiveX controls not marked as safe" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1201 is REG_DWORD = 3, this is not a finding.
Fix: F-38808r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Initialize and script ActiveX controls not marked as safe" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI030
- Vuln IDs
-
- V-6248
- Rule IDs
-
- SV-45158r1_rule
Checks: C-42501r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow font downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1604 is REG_DWORD = 3, this is not a finding.
Fix: F-38554r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow font downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI031
- Vuln IDs
-
- V-6249
- Rule IDs
-
- SV-45420r2_rule
Checks: C-42770r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38817r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI032
- Vuln IDs
-
- V-6250
- Rule IDs
-
- SV-45065r1_rule
Checks: C-42438r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Access data sources across domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1406 is REG_DWORD = 3, this is not a finding.
Fix: F-38473r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Access data sources across domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI036
- Vuln IDs
-
- V-6253
- Rule IDs
-
- SV-45212r1_rule
Checks: C-42560r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow drag and drop or copy and paste files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value for 1802 is REG_DWORD = 3, this is not a finding.
Fix: F-38608r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow drag and drop or copy and paste files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI038
- Vuln IDs
-
- V-6255
- Rule IDs
-
- SV-45265r1_rule
Checks: C-42612r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Launching applications and files in an IFRAME" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1804 is REG_DWORD = 3, this is not a finding.
Fix: F-38661r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Launching applications and files in an IFRAME" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI039
- Vuln IDs
-
- V-6256
- Rule IDs
-
- SV-45280r1_rule
Checks: C-42627r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Navigate windows and frames across different domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\InternetSettings\Zones\3 Criteria: If the value 1607 is REG_DWORD = 3, this is not a finding.
Fix: F-38676r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Navigate windows and frames across different domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI042
- Vuln IDs
-
- V-6259
- Rule IDs
-
- SV-45459r1_rule
Checks: C-42807r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Userdata persistence" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1606 is REG_DWORD = 3, this is not a finding.
Fix: F-38856r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Userdata persistence" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI044
- Vuln IDs
-
- V-6260
- Rule IDs
-
- SV-45122r1_rule
Checks: C-42473r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow cut, copy or paste operations from the clipboard via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1407 is REG_DWORD = 3, this is not a finding.
Fix: F-38519r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow cut, copy or paste operations from the clipboard via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI046
- Vuln IDs
-
- V-6262
- Rule IDs
-
- SV-45273r1_rule
Checks: C-42620r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Logon options" must be "Enabled", and "Prompt for user name and password" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1A00 is REG_DWORD = 65536 (decimal), this is not a finding.
Fix: F-38669r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Logon options" to "Enabled", and select "Prompt for user name and password" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI061
- Vuln IDs
-
- V-6267
- Rule IDs
-
- SV-45250r2_rule
Checks: C-42597r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> "Java permissions" must be "Enabled", and "High Safety" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1 Criteria: If the value 1C00 is REG_DWORD = 65536, (Decimal), this is not a finding.
Fix: F-38646r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> "Java permissions" to "Enabled", and select "High Safety" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI091
- Vuln IDs
-
- V-6281
- Rule IDs
-
- SV-45251r2_rule
Checks: C-42598r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> "Java permissions" must be "Enabled", and "High Safety" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 Criteria: If the value 1C00 is REG_DWORD = 65536, (Decimal), this is not a finding.
Fix: F-38647r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> "Java permissions" to "Enabled", and select "High Safety" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI112
- Vuln IDs
-
- V-6289
- Rule IDs
-
- SV-45326r1_rule
Checks: C-42675r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download signed ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1001 is REG_DWORD = 3, this is not a finding.
Fix: F-38723r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download signed ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI113
- Vuln IDs
-
- V-6290
- Rule IDs
-
- SV-45330r1_rule
Checks: C-42679r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download unsigned ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1004 is REG_DWORD = 3, this is not a finding.
Fix: F-38727r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download unsigned ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI114
- Vuln IDs
-
- V-6291
- Rule IDs
-
- SV-45403r1_rule
Checks: C-42752r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Initialize and script ActiveX controls not marked as safe" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1201 is REG_DWORD = 3, this is not a finding.
Fix: F-38800r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Initialize and script ActiveX controls not marked as safe" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI115
- Vuln IDs
-
- V-6292
- Rule IDs
-
- SV-45072r1_rule
Checks: C-42444r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run ActiveX controls and plugins" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1200 is REG_DWORD = 3, this is not a finding.
Fix: F-38479r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run ActiveX controls and plugins" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI116
- Vuln IDs
-
- V-6293
- Rule IDs
-
- SV-45074r1_rule
Checks: C-42446r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Script ActiveX controls marked safe for scripting" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1405 is REG_DWORD = 3, this is not a finding.
Fix: F-38481r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Script ActiveX controls marked safe for scripting" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI119
- Vuln IDs
-
- V-6294
- Rule IDs
-
- SV-45150r1_rule
Checks: C-42493r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow file downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1803 is REG_DWORD = 3, this is not a finding.
Fix: F-38546r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI120
- Vuln IDs
-
- V-6295
- Rule IDs
-
- SV-45159r1_rule
Checks: C-42503r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow font downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1604 is REG_DWORD = 3, this is not a finding.
Fix: F-38556r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow font downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI122
- Vuln IDs
-
- V-6297
- Rule IDs
-
- SV-45069r1_rule
Checks: C-42441r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Access data sources across domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1406 is REG_DWORD = 3, this is not a finding.
Fix: F-38476r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Access data sources across domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI123
- Vuln IDs
-
- V-6298
- Rule IDs
-
- SV-45324r1_rule
Checks: C-42672r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow META REFRESH" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1608 is REG_DWORD = 3, this is not a finding.
Fix: F-38720r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow META REFRESH" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI126
- Vuln IDs
-
- V-6301
- Rule IDs
-
- SV-45213r1_rule
Checks: C-42561r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow drag and drop or copy and paste files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1802 is REG_DWORD=3, this is not a finding.
Fix: F-38609r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow drag and drop or copy and paste files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI127
- Vuln IDs
-
- V-6302
- Rule IDs
-
- SV-45216r1_rule
Checks: C-42564r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow installation of desktop items" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1800 is REG_DWORD = 3, this is not a finding.
Fix: F-38612r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow installation of desktop items" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI128
- Vuln IDs
-
- V-6303
- Rule IDs
-
- SV-45267r1_rule
Checks: C-42614r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Launching applications and files in an IFRAME" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1804 is REG_DWORD = 3, this is not a finding.
Fix: F-38663r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Launching applications and files in an IFRAME" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI129
- Vuln IDs
-
- V-6304
- Rule IDs
-
- SV-45281r1_rule
Checks: C-42628r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Navigate windows and frames across different domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1607 is REG_DWORD = 3, this is not a finding.
Fix: F-38677r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Navigate windows and frames across different domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI132
- Vuln IDs
-
- V-6307
- Rule IDs
-
- SV-45482r1_rule
Checks: C-42831r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Userdata persistence" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1606 is REG_DWORD = 3, this is not a finding.
Fix: F-38879r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Userdata persistence" to "Enabled", and select "Disable" from the drop-down box
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI133
- Vuln IDs
-
- V-6308
- Rule IDs
-
- SV-45071r1_rule
Checks: C-42443r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow active scripting" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1400 is REG_DWORD = 3, this is not a finding.
Fix: F-38478r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow active scripting" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI134
- Vuln IDs
-
- V-6309
- Rule IDs
-
- SV-45126r1_rule
Checks: C-42474r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow cut, copy or paste operations from the clipboard via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1407 is REG_DWORD = 3, this is not a finding.
Fix: F-38522r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow cut, copy or paste operations from the clipboard via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI136
- Vuln IDs
-
- V-6311
- Rule IDs
-
- SV-45271r1_rule
Checks: C-42618r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Logon options" must be "Enabled", and "Anonymous logon" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1A00 is REG_DWORD = 196608 (decimal), this is not a finding.
Fix: F-38667r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Logon options" to "Enabled", and select "Anonymous logon" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI121
- Vuln IDs
-
- V-7007
- Rule IDs
-
- SV-45263r2_rule
Checks: C-42610r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38659r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI697
- Vuln IDs
-
- V-14245
- Rule IDs
-
- SV-45057r2_rule
Checks: C-42431r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Do Not Allow users to enable or disable add-ons" must be "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions Criteria: If the value NoExtensionManagement does not exist ("Not Configured") or the value is set to REG_DWORD = 0 ("Disabled"), this is not a finding.
Fix: F-38466r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> "Do Not Allow users to enable or disable add-ons" to "Disabled" or "Not Configured".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI305
- Vuln IDs
-
- V-15490
- Rule IDs
-
- SV-45107r1_rule
Checks: C-42464r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable changing Automatic Configuration settings" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel Criteria: If the value Autoconfig is REG_DWORD = 1 (Hex), this is not a finding.
Fix: F-38506r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable changing Automatic Configuration settings" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI315
- Vuln IDs
-
- V-15492
- Rule IDs
-
- SV-45282r1_rule
Checks: C-42629r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent participation in the Customer Experience Improvement Program" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\SQM Criteria: If the value DisableCustomerImprovementProgram is REG_DWORD = 0, this is not a finding.
Fix: F-38678r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent participation in the Customer Experience Improvement Program" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI325
- Vuln IDs
-
- V-15494
- Rule IDs
-
- SV-45302r1_rule
Checks: C-42650r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off the Security Settings Check feature" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Security Criteria: If the value DisableSecuritySettingsCheck is REG_DWORD = 0, this is not a finding.
Fix: F-38698r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off the Security Settings Check feature" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI340
- Vuln IDs
-
- V-15497
- Rule IDs
-
- SV-45070r1_rule
Checks: C-42442r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow active content from CDs to run on user machines" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings Criteria: If the value LOCALMACHINE_CD_UNLOCK is REG_DWORD = 0, this is not a finding.
Fix: F-38477r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow active content from CDs to run on user machines" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI350
- Vuln IDs
-
- V-15499
- Rule IDs
-
- SV-45311r2_rule
Checks: C-42659r2_chk
Note: Some legitimate software and controls may have an invalid signature. You should carefully test such software in isolation before it is allowed to be used on an organization's network. The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow software to run or install even if the signature is invalid" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Download Criteria: If the value RunInvalidSignatures is REG_DWORD = 0, this is not a finding.
Fix: F-38707r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow software to run or install even if the signature is invalid" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI355
- Vuln IDs
-
- V-15500
- Rule IDs
-
- SV-45445r2_rule
Checks: C-42794r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow third-party browser extensions" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Enable Browser Extensions is REG_SZ = no, this is not a finding.
Fix: F-38842r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow third-party browser extensions" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI365
- Vuln IDs
-
- V-15502
- Rule IDs
-
- SV-45335r1_rule
Checks: C-42684r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for server certificate revocation" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value CertificateRevocation is REG_DWORD = 1, this is not a finding.
Fix: F-38731r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for server certificate revocation" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI370
- Vuln IDs
-
- V-15503
- Rule IDs
-
- SV-45120r1_rule
Checks: C-42472r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for signatures on downloaded programs" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Download Criteria: If the value CheckExeSignatures is REG_SZ = yes, this is not a finding.
Fix: F-38517r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for signatures on downloaded programs" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI375
- Vuln IDs
-
- V-15504
- Rule IDs
-
- SV-45079r1_rule
Checks: C-42451r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> "Intranet Sites: Include all network paths (UNCs)" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap Criteria: If the value UNCAsIntranet is REG_DWORD = 0, this is not a finding.
Fix: F-38486r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> "Intranet Sites: Include all network paths (UNCs)" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI385
- Vuln IDs
-
- V-15507
- Rule IDs
-
- SV-45296r1_rule
Checks: C-42644r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow script-initiated windows without size or position constraints" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2102 is REG_DWORD = 3, this is not a finding.
Fix: F-38692r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow script-initiated windows without size or position constraints" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI390
- Vuln IDs
-
- V-15508
- Rule IDs
-
- SV-45297r1_rule
Checks: C-42645r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow script-initiated windows without size or position constraints" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2102 is REG_DWORD = 3, this is not a finding.
Fix: F-38693r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow script-initiated windows without size or position constraints" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI395
- Vuln IDs
-
- V-15509
- Rule IDs
-
- SV-45299r1_rule
Checks: C-42647r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow Scriptlets" must be "Enabled", and "Disable" from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1209 is REG_DWORD = 3, this is not a finding.
Fix: F-38695r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow Scriptlets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI415
- Vuln IDs
-
- V-15513
- Rule IDs
-
- SV-45108r1_rule
Checks: C-42465r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Automatic prompting for file downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2200 is REG_DWORD = 3, this is not a finding.
Fix: F-38507r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Automatic prompting for file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI425
- Vuln IDs
-
- V-15515
- Rule IDs
-
- SV-45252r2_rule
Checks: C-42599r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38648r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> "Java permissions" to "Enabled", and "Disable Java" selected from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI430
- Vuln IDs
-
- V-15516
- Rule IDs
-
- SV-45255r2_rule
Checks: C-42602r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38651r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI435
- Vuln IDs
-
- V-15517
- Rule IDs
-
- SV-45254r2_rule
Checks: C-42601r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38650r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI440
- Vuln IDs
-
- V-15518
- Rule IDs
-
- SV-45261r2_rule
Checks: C-42608r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38657r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI445
- Vuln IDs
-
- V-15519
- Rule IDs
-
- SV-45253r2_rule
Checks: C-42600r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38649r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI450
- Vuln IDs
-
- V-15520
- Rule IDs
-
- SV-45257r2_rule
Checks: C-42604r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38653r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI455
- Vuln IDs
-
- V-15521
- Rule IDs
-
- SV-45493r1_rule
Checks: C-42843r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow loading of XAML files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2402 is REG_DWORD = 3, this is not a finding.
Fix: F-38891r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow loading of XAML files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI460
- Vuln IDs
-
- V-15522
- Rule IDs
-
- SV-45497r1_rule
Checks: C-42846r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow loading of XAML files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2402 is REG_DWORD = 3, this is not a finding.
Fix: F-38894r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow loading of XAML files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI465
- Vuln IDs
-
- V-15523
- Rule IDs
-
- SV-45276r1_rule
Checks: C-42623r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Enable MIME Sniffing" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2100 is REG_DWORD = 3, this is not a finding.
Fix: F-38672r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Enable MIME Sniffing" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI470
- Vuln IDs
-
- V-15524
- Rule IDs
-
- SV-45278r1_rule
Checks: C-42625r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Enable MIME Sniffing" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2100 is REG_DWORD = 3, this is not a finding.
Fix: F-38674r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Enable MIME Sniffing" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI475
- Vuln IDs
-
- V-15525
- Rule IDs
-
- SV-45155r1_rule
Checks: C-42498r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn off first-run prompt" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1208 is REG_DWORD = 3, this is not a finding.
Fix: F-38551r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn off first-run prompt" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI480
- Vuln IDs
-
- V-15526
- Rule IDs
-
- SV-45157r1_rule
Checks: C-42500r2_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn off first-run prompt" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1208 is REG_DWORD = 3, this is not a finding.
Fix: F-38553r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn off first-run prompt" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI485
- Vuln IDs
-
- V-15527
- Rule IDs
-
- SV-45288r2_rule
Checks: C-42635r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Protected Mode" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2500 is REG_DWORD = 0, this is not a finding.
Fix: F-38684r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Protected Mode" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI490
- Vuln IDs
-
- V-15528
- Rule IDs
-
- SV-45290r1_rule
Checks: C-42637r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Protected Mode" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2500 is REG_DWORD = 0, this is not a finding.
Fix: F-38686r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Protected Mode" to "Enabled" and select "Enable", from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI495
- Vuln IDs
-
- V-15529
- Rule IDs
-
- SV-45283r1_rule
Checks: C-42630r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Use Pop-up Blocker" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1809 is REG_DWORD = 0, this is not a finding.
Fix: F-38679r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Use Pop-up Blocker" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI500
- Vuln IDs
-
- V-15530
- Rule IDs
-
- SV-45284r1_rule
Checks: C-42631r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Use Pop-up Blocker" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1809 is REG_DWORD = 0, this is not a finding.
Fix: F-38680r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Use Pop-up Blocker" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI515
- Vuln IDs
-
- V-15533
- Rule IDs
-
- SV-45486r1_rule
Checks: C-42835r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Web sites in less privileged Web content zones can navigate into this zone" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2101 is REG_DWORD = 3, this is not a finding.
Fix: F-38883r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Web sites in less privileged Web content zones can navigate into this zone" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI520
- Vuln IDs
-
- V-15534
- Rule IDs
-
- SV-45489r1_rule
Checks: C-42838r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Web sites in less privileged Web content zones can navigate into this zone" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2101 is REG_DWORD = 3, this is not a finding.
Fix: F-38886r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Web sites in less privileged Web content zones can navigate into this zone" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI575
- Vuln IDs
-
- V-15545
- Rule IDs
-
- SV-45098r1_rule
Checks: C-42456r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow binary and script behaviors" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2000 is REG_DWORD = 3, this is not a finding.
Fix: F-38498r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow binary and script behaviors" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI580
- Vuln IDs
-
- V-15546
- Rule IDs
-
- SV-45111r1_rule
Checks: C-42466r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Automatic prompting for file downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2200 is REG_DWORD = 3, this is not a finding.
Fix: F-38508r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Automatic prompting for file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI590
- Vuln IDs
-
- V-15548
- Rule IDs
-
- SV-45224r1_rule
Checks: C-42572r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38620r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI595
- Vuln IDs
-
- V-15549
- Rule IDs
-
- SV-45227r1_rule
Checks: C-42575r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38623r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI600
- Vuln IDs
-
- V-15550
- Rule IDs
-
- SV-45228r1_rule
Checks: C-42576r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38624r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI605
- Vuln IDs
-
- V-15551
- Rule IDs
-
- SV-45229r1_rule
Checks: C-42577r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38625r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI610
- Vuln IDs
-
- V-15552
- Rule IDs
-
- SV-45244r1_rule
Checks: C-42593r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38640r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI630
- Vuln IDs
-
- V-15556
- Rule IDs
-
- SV-45236r1_rule
Checks: C-42584r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38632r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI635
- Vuln IDs
-
- V-15557
- Rule IDs
-
- SV-45234r1_rule
Checks: C-42582r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38630r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI640
- Vuln IDs
-
- V-15558
- Rule IDs
-
- SV-45235r1_rule
Checks: C-42583r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38631r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI645
- Vuln IDs
-
- V-15559
- Rule IDs
-
- SV-45241r1_rule
Checks: C-42590r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38637r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI650
- Vuln IDs
-
- V-15560
- Rule IDs
-
- SV-45049r1_rule
Checks: C-42427r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components not signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2004 is REG_DWORD = 3, this is not a finding.
Fix: F-38461r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components not signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI655
- Vuln IDs
-
- V-15561
- Rule IDs
-
- SV-45054r1_rule
Checks: C-42430r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2001 is REG_DWORD = 3, this is not a finding.
Fix: F-38464r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI670
- Vuln IDs
-
- V-15562
- Rule IDs
-
- SV-45294r2_rule
Checks: C-42642r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Scripting of Java applets" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1402 is REG_DWORD = 3, this is not a finding.
Fix: F-38690r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Scripting of Java applets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI675
- Vuln IDs
-
- V-15563
- Rule IDs
-
- SV-45439r1_rule
Checks: C-42788r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" must be "Enabled" with a "blank or empty" selection box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: The Update_Check_Page value must exist. The value must contain no data value. If the value Update_Check_Page is not present, this is a finding.
Fix: F-38836r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" to "Enabled" with a "blank or empty" selection box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI680
- Vuln IDs
-
- V-15564
- Rule IDs
-
- SV-45435r1_rule
Checks: C-42784r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent specifying the update check interval (in days)" must be "Enabled", and "30" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Update_Check_Interval is REG_DWORD = 30 (Decimal), this is not a finding.
Fix: F-38832r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent specifying the update check interval (in days)" to "Enabled", and select "30" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI592
- Vuln IDs
-
- V-15565
- Rule IDs
-
- SV-45222r1_rule
Checks: C-42570r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38618r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI594
- Vuln IDs
-
- V-15566
- Rule IDs
-
- SV-45223r1_rule
Checks: C-42571r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38619r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI599
- Vuln IDs
-
- V-15568
- Rule IDs
-
- SV-45230r1_rule
Checks: C-42578r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38626r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI612
- Vuln IDs
-
- V-15569
- Rule IDs
-
- SV-45242r1_rule
Checks: C-42591r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38638r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI614
- Vuln IDs
-
- V-15570
- Rule IDs
-
- SV-45243r1_rule
Checks: C-42592r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38639r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI647
- Vuln IDs
-
- V-15571
- Rule IDs
-
- SV-45237r1_rule
Checks: C-42585r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38633r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI649
- Vuln IDs
-
- V-15572
- Rule IDs
-
- SV-45240r1_rule
Checks: C-42589r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38636r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI690
- Vuln IDs
-
- V-15574
- Rule IDs
-
- SV-45099r1_rule
Checks: C-42457r1_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable AutoComplete for forms" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Use FormSuggest is REG_SZ = no, this is not a finding.
Fix: F-38499r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable AutoComplete for forms" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI715
- Vuln IDs
-
- V-15579
- Rule IDs
-
- SV-45130r1_rule
Checks: C-42476r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Crash Detection" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key:HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions Criteria: If the value NoCrashDetection is REG_DWORD = 1, this is not a finding.
Fix: F-38526r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Crash Detection" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI725
- Vuln IDs
-
- V-15581
- Rule IDs
-
- SV-45101r1_rule
Checks: C-42458r1_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on the auto-complete feature for user names and passwords on forms" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value FormSuggest Passwords is REG_SZ = no, this is not a finding. AND Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value FormSuggest PW Ask is REG_SZ = no, this is not a finding.
Fix: F-38500r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on the auto-complete feature for user names and passwords on forms" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI596
- Vuln IDs
-
- V-15603
- Rule IDs
-
- SV-45225r1_rule
Checks: C-42573r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38621r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI597
- Vuln IDs
-
- V-15604
- Rule IDs
-
- SV-45226r1_rule
Checks: C-42574r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38622r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI010
- Vuln IDs
-
- V-17296
- Rule IDs
-
- SV-45152r1_rule
Checks: C-42495r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent running First Run Wizard" must be "Enabled", and "Go directly to home page" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DisableFirstRunCustomize is REG_DWORD = 1, this is not a finding.
Fix: F-38548r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent running First Run Wizard" to "Enabled", and select "Go directly to home page" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI300
- Vuln IDs
-
- V-21887
- Rule IDs
-
- SV-45128r1_rule
Checks: C-42475r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Disable Configuring History" must be "Enabled", and "40" entered in 'Days to keep pages in History'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel Criteria: If the value History is REG_DWORD = 1, this is not a finding. AND Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Url History Criteria: If the value DaysToKeep is REG_DWORD = 40 (decimal), this is not a finding.
Fix: F-38525r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Disable Configuring History" to "Enabled", and enter "40" in 'Days to keep pages in History'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI740
- Vuln IDs
-
- V-22108
- Rule IDs
-
- SV-45275r2_rule
Checks: C-42622r3_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> "Prevent Managing SmartScreen Filter" must be "Enabled", and "On" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\PhishingFilter Criteria: If the value EnabledV9 is REG_DWORD = 1, this is not a finding.
Fix: F-38671r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> "Prevent Managing SmartScreen Filter" to "Enabled", and select "On" from the drop-down box.
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI750
- Vuln IDs
-
- V-22147
- Rule IDs
-
- SV-45449r1_rule
Checks: C-42798r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Compatibility View -> "Include updated Web site lists from Microsoft" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\BrowserEmulation Criteria: If the value MSCompatibilityMode is REG_DWORD = 0, this is not a finding.
Fix: F-38846r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Compatibility View -> "Include updated Web site lists from Microsoft" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI760
- Vuln IDs
-
- V-22148
- Rule IDs
-
- SV-45115r1_rule
Checks: C-42470r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Allow deleting browsing history on exit" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value ClearBrowsingHistoryOnExit is REG_DWORD = 0, this is not a finding.
Fix: F-38511r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Allow deleting browsing history on exit" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI770
- Vuln IDs
-
- V-22149
- Rule IDs
-
- SV-45137r1_rule
Checks: C-42481r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Prevent Deleting Web sites that the User has Visited" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value CleanHistory is REG_DWORD = 0, this is not a finding.
Fix: F-38534r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Prevent Deleting Web sites that the User has Visited" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI780
- Vuln IDs
-
- V-22150
- Rule IDs
-
- SV-45214r1_rule
Checks: C-42562r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Privacy -> "Turn off InPrivate Browsing" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value EnableInPrivateBrowsing is REG_DWORD = 0, this is not a finding.
Fix: F-38610r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Privacy -> "Turn off InPrivate Browsing" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI800
- Vuln IDs
-
- V-22152
- Rule IDs
-
- SV-45293r1_rule
Checks: C-42641r4_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow scripting of Internet Explorer WebBrowser controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1206 is REG_DWORD = 3, this is not a finding.
Fix: F-38689r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow scripting of Internet Explorer WebBrowser controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI810
- Vuln IDs
-
- V-22153
- Rule IDs
-
- SV-45490r1_rule
Checks: C-42839r2_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Include local path when user is uploading files to a server" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 160A is REG_DWORD = 3, this is not a finding.
Fix: F-38887r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Include local path when user is uploading files to a server" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI820
- Vuln IDs
-
- V-22154
- Rule IDs
-
- SV-45306r1_rule
Checks: C-42654r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Show security warning for potentially unsafe files" must be "Enabled", and "Prompt" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1806 is REG_DWORD = 1, this is not a finding.
Fix: F-38702r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Show security warning for potentially unsafe files" to "Enabled", and select "Prompt" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI830
- Vuln IDs
-
- V-22155
- Rule IDs
-
- SV-45075r1_rule
Checks: C-42447r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> " Allow only approved domains to use ActiveX controls without prompt" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 120b is REG_DWORD = 3, this is not a finding.
Fix: F-38482r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow only approved domains to use ActiveX controls without prompt" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI840
- Vuln IDs
-
- V-22156
- Rule IDs
-
- SV-45131r1_rule
Checks: C-42477r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Cross-Site Scripting (XSS) Filter" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1409 is REG_DWORD = 0, this is not a finding.
Fix: F-38528r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Cross-Site Scripting (XSS) Filter" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI850
- Vuln IDs
-
- V-22157
- Rule IDs
-
- SV-45291r1_rule
Checks: C-42639r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow scripting of Internet Explorer WebBrowser controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1206 is REG_DWORD = 3, this is not a finding.
Fix: F-38687r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow scripting of Internet Explorer WebBrowser controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI860
- Vuln IDs
-
- V-22158
- Rule IDs
-
- SV-45491r1_rule
Checks: C-42840r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Include local path when user is uploading files to a server" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 160A is REG_DWORD = 3, this is not a finding.
Fix: F-38889r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Include local path when user is uploading files to a server" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI870
- Vuln IDs
-
- V-22159
- Rule IDs
-
- SV-45309r1_rule
Checks: C-42658r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Show security warning for potentially unsafe files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1806 is REG_DWORD = 3, this is not a finding.
Fix: F-38706r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Show security warning for potentially unsafe files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI880
- Vuln IDs
-
- V-22160
- Rule IDs
-
- SV-45076r1_rule
Checks: C-42448r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow only approved domains to use ActiveX controls without prompt" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 120b is REG_DWORD = 3, this is not a finding.
Fix: F-38483r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow only approved domains to use ActiveX controls without prompt" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI890
- Vuln IDs
-
- V-22161
- Rule IDs
-
- SV-45133r1_rule
Checks: C-42478r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Cross-Site Scripting (XSS) Filter" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1409 is REG_DWORD = 0, this is not a finding.
Fix: F-38529r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Cross-Site Scripting (XSS) Filter" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI900
- Vuln IDs
-
- V-22171
- Rule IDs
-
- SV-45249r1_rule
Checks: C-42596r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38645r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI910
- Vuln IDs
-
- V-22634
- Rule IDs
-
- SV-45314r1_rule
Checks: C-42662r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Allow updates to status bar via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2103 is REG_DWORD = 3, this is not a finding.
Fix: F-38710r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Allow updates to status bar via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI920
- Vuln IDs
-
- V-22635
- Rule IDs
-
- SV-45047r1_rule
Checks: C-42426r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components not signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2004 is REG_DWORD = 3, this is not a finding.
Fix: F-38460r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components not signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI930
- Vuln IDs
-
- V-22636
- Rule IDs
-
- SV-45053r1_rule
Checks: C-42429r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2001 is REG_DWORD = 3, this is not a finding.
Fix: F-38463r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI940
- Vuln IDs
-
- V-22637
- Rule IDs
-
- SV-45301r1_rule
Checks: C-42649r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow Scriptlets" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1209 is REG_DWORD = 3, this is not a finding.
Fix: F-38697r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow Scriptlets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI950
- Vuln IDs
-
- V-22638
- Rule IDs
-
- SV-45318r1_rule
Checks: C-42667r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow updates to status bar via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2103 is REG_DWORD = 3, this is not a finding.
Fix: F-38714r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow updates to status bar via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1010
- Vuln IDs
-
- V-22687
- Rule IDs
-
- SV-45475r1_rule
Checks: C-42824r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38872r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1020
- Vuln IDs
-
- V-22688
- Rule IDs
-
- SV-45473r1_rule
Checks: C-42822r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38870r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI745
- Vuln IDs
-
- V-30774
- Rule IDs
-
- SV-45078r1_rule
Checks: C-42450r2_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off add-on performance notifications" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Ext Criteria: If the value DisableAddonLoadTimePerformanceNotifications is REG_DWORD = 1, this is not a finding.
Fix: F-38485r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off add-on performance notifications" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI755
- Vuln IDs
-
- V-30775
- Rule IDs
-
- SV-45112r1_rule
Checks: C-42467r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Browser Geolocation" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Geolocation Criteria: If the value PolicyDisableGeolocation is REG_DWORD = 1, this is not a finding.
Fix: F-38509r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Browser Geolocation" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI765
- Vuln IDs
-
- V-30776
- Rule IDs
-
- SV-45321r2_rule
Checks: C-42669r2_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> "Turn on Suggested Sites" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Suggested Sites Criteria: If the value "Enabled is REG_DWORD = 0", this is not a finding.
Fix: F-38717r2_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> "Turn on Suggested Sites" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI775
- Vuln IDs
-
- V-30777
- Rule IDs
-
- SV-45103r1_rule
Checks: C-42460r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel-> Advanced Page-> "Automatically check for Internet Explorer updates" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value NoUpdateCheck is REG_DWORD = 1, this is not a finding.
Fix: F-38502r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel-> Advanced Page-> "Automatically check for Internet Explorer updates" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI805
- Vuln IDs
-
- V-30778
- Rule IDs
-
- SV-45077r1_rule
Checks: C-42449r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off ActiveX opt-in prompt" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Ext Criteria: If the value NoFirsttimeprompt is REG_DWORD = 1, this is not a finding.
Fix: F-38484r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off ActiveX opt-in prompt" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI815
- Vuln IDs
-
- V-30779
- Rule IDs
-
- SV-45233r1_rule
Checks: C-42581r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38629r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI825
- Vuln IDs
-
- V-30780
- Rule IDs
-
- SV-45231r1_rule
Checks: C-42579r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38627r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI835
- Vuln IDs
-
- V-30781
- Rule IDs
-
- SV-45232r1_rule
Checks: C-42580r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38628r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI018
- Vuln IDs
-
- V-32808
- Rule IDs
-
- SV-45116r3_rule
Checks: C-42471r4_chk
Open Internet Explorer. From the menu bar select Tools. From the Tools drop-down menu, select Internet Options. From the Internet Options window, select the "Advanced" tab from the Advanced tab window, scroll down to the Security category, and verify the "Check for publisher's certificate revocation" box is selected. The policy value for Computer configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for server certificate revocation" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Criteria: If the value State is REG_DWORD = 65536 (decimal), this is not a finding.
Fix: F-38512r4_fix
In the Internet Explorer Options, on the "Advanced" tab, scroll down to Security category, and select the "Check for publisher's certificate revocation" box. NOTE: Manual entry for the value State, set to REG_DWORD = 65536, may first be required.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1040
- Vuln IDs
-
- V-34414
- Rule IDs
-
- SV-45046r1_rule
Checks: C-42425r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Always send Do Not Track header" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DoNotTrack is REG_DWORD = 1, this is not a finding.
Fix: F-38459r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Always send Do Not Track header" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI980
- Vuln IDs
-
- V-34425
- Rule IDs
-
- SV-45063r1_rule
Checks: C-42436r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Install new versions of Internet Explorer automatically" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value EnableAutoUpgrade is REG_DWORD = 0, this is not a finding.
Fix: F-38471r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Install new versions of Internet Explorer automatically" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1035
- Vuln IDs
-
- V-34456
- Rule IDs
-
- SV-45140r1_rule
Checks: C-42483r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Security Features "Do not display the reveal password button" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DisablePasswordReveal is REG_DWORD = 1, this is not a finding.
Fix: F-38536r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Security Features "Do not display the reveal password button" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI990
- Vuln IDs
-
- V-34457
- Rule IDs
-
- SV-45142r1_rule
Checks: C-42485r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains across windows" must be "Enabled", and "Disabled" selected. Procedure: Use the windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2709 is REG_DWORD = 3, this is not a finding.
Fix: F-38538r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains across windows" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1005
- Vuln IDs
-
- V-34458
- Rule IDs
-
- SV-45143r1_rule
Checks: C-42486r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains across windows" must be "Enabled", and "Disabled" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2709 is REG_DWORD = 3, this is not a finding.
Fix: F-38539r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains across windows" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1000
- Vuln IDs
-
- V-34459
- Rule IDs
-
- SV-45144r1_rule
Checks: C-42487r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains within a window" must be "Enabled", and "Disabled" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2708 is REG_DWORD = 3, this is not a finding.
Fix: F-38540r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains within a window" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1025
- Vuln IDs
-
- V-34460
- Rule IDs
-
- SV-45146r1_rule
Checks: C-42489r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains within a window" must be "Enabled", and "Disabled" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2708 is REG_DWORD = 3, this is not a finding.
Fix: F-38542r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains within a window" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI995
- Vuln IDs
-
- V-34461
- Rule IDs
-
- SV-45147r1_rule
Checks: C-42490r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Turn on Enhanced Protected Mode" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Isolation is REG_SZ = PMEM, this is not a finding.
Fix: F-38543r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Turn on Enhanced Protected Mode" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1055
- Vuln IDs
-
- V-34474
- Rule IDs
-
- SV-45217r1_rule
Checks: C-42565r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Accelerators "Turn off Accelerators" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Activities Criteria: If the value NoActivities is REG_DWORD = 1, this is not a finding.
Fix: F-38613r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Accelerators "Turn off Accelerators" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1045
- Vuln IDs
-
- V-34489
- Rule IDs
-
- SV-45269r1_rule
Checks: C-42616r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Render Legacy Filters" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 270B is REG_DWORD = 3, this is not a finding.
Fix: F-38665r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Render Legacy Filters" to "Enabled", and select "Disable".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1050
- Vuln IDs
-
- V-34490
- Rule IDs
-
- SV-45270r1_rule
Checks: C-42617r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Render Legacy Filters" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 270B is REG_DWORD = 3, this is not a finding.
Fix: F-38666r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Render Legacy Filters" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1030
- Vuln IDs
-
- V-34590
- Rule IDs
-
- SV-45454r1_rule
Checks: C-42803r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Settings-> AutoComplete "Turn off URL Suggestions" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\DomainSuggestion Criteria: If the value Enabled is REG_DWORD = 0, this is not a finding.
Fix: F-38851r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Settings-> AutoComplete "Turn off URL Suggestions" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI985
- Vuln IDs
-
- V-34610
- Rule IDs
-
- SV-45478r1_rule
Checks: C-42826r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DisableEPMCompat is REG_DWORD = 1, this is not a finding.
Fix: F-38875r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" to "Enabled".
- RMF Control
- Severity
- H
- CCI
- Version
- DTBI002
- Vuln IDs
-
- V-64727
- Rule IDs
-
- SV-79217r1_rule
Checks: C-65469r3_chk
Procedure: Open Internet Explorer, Select Help, Select About. Criteria: Internet Explorer 10 is only supported on Windows Server 2012. If the version number of Internet Explorer is any version of Internet Explorer 10, the Operating System in use must be Windows Server 2012. If Internet Explorer 10 is used on any other Operating System, this is a finding.
Fix: F-70657r1_fix
Upgrade Internet Explorer to a supported software version.