Microsoft Internet Explorer 10 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI320
- Vuln IDs
-
- V-3427
- Rule IDs
-
- SV-45220r1_rule
Checks: C-42568r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Use only machine settings" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value Security_HKLM_only is REG_DWORD = 1, this is not a finding.
Fix: F-38616r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Use only machine settings" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI319
- Vuln IDs
-
- V-3428
- Rule IDs
-
- SV-45218r1_rule
Checks: C-42566r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to change policies" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value Security_options_edit is REG_DWORD = 1, this is not a finding.
Fix: F-38614r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to change policies" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI318
- Vuln IDs
-
- V-3429
- Rule IDs
-
- SV-45221r1_rule
Checks: C-42569r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to add/delete sites" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value Security_zones_map_edit is REG_DWORD = 1, this is not a finding.
Fix: F-38617r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to add/delete sites" to "Enabled".
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI367
- Vuln IDs
-
- V-3430
- Rule IDs
-
- SV-45219r1_rule
Checks: C-42567r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Make proxy settings per-machine (rather than per user)" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value ProxySettingsPerUser is REG_DWORD = 1, this is not a finding.
Fix: F-38615r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Make proxy settings per-machine (rather than per user)" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI001
- Vuln IDs
-
- V-6228
- Rule IDs
-
- SV-6278r3_rule
Checks: C-170r2_chk
Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Microsoft\Internet Explorer\Main Criteria: If the value Start Page is about:blank or a trusted site this is not a finding.
Fix: F-131r2_fix
Change Start Page value to about:blank or a trusted site.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI014
- Vuln IDs
-
- V-6238
- Rule IDs
-
- SV-45415r3_rule
Checks: C-42764r4_chk
Open Internet Explorer. From the menu bar, select Tools. From the Tools drop-down menu, select Internet Options. From the Internet Options window, select the Advanced tab, from the Advanced tab window scroll down to the Security category. Verify a check mark is placed in 'Use SSL 3.0' and 'Use TLS 1.0' check boxes. Check marks can also be placed in 'Use TLS 1.1' and/or 'Use TLS 1.2'. If so, this is acceptable and not a finding. Verify there is not a check placed in the check box for 'Use SSL 2.0'. If 'Use SSL 2.0' is checked, then this is a finding. The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page-> 'Turn off Encryption Support' must be 'Enabled' and ensure the option selected includes 'Use SSL 3.0 and TLS 1.0' from the drop-down box. If 'TLS 1.1' and/or 'TLS 1.2' is also included in the option, this is not a finding. If the selected option contains 'SSL 2.0', then this is a finding.
Fix: F-38812r4_fix
Open Internet Explorer. From the menu bar, select Tools. From the Tools drop-down menu, select Internet Options. From the Internet Options window, select the Advanced tab, from the Advanced tab window scroll down to the Security category. Place a check mark in 'Use SSL 3.0' and 'Use TLS 1.0' check boxes. Check marks can also be placed in 'Use TLS 1.1' and/or 'Use TLS 1.2'. Uncheck 'Use SSL 2.0' option. Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page-> 'Turn off Encryption Support' to 'Enabled' and select 'Use SSL 3.0 and TLS 1.0' from the drop down box. The option may also include 'TLS 1.1' and/or 'TLS 1.2'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI015
- Vuln IDs
-
- V-6239
- Rule IDs
-
- SV-45417r1_rule
Checks: C-42768r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page "Turn on certificate address mismatch warning" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value WarnOnBadCertRecving is REG_DWORD = 1, this is not a finding.
Fix: F-38815r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page "Turn on certificate address mismatch warning" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI022
- Vuln IDs
-
- V-6243
- Rule IDs
-
- SV-45406r1_rule
Checks: C-42756r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download signed ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1001 is REG_DWORD = 3, this is not a finding.
Fix: F-38804r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download signed ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI023
- Vuln IDs
-
- V-6244
- Rule IDs
-
- SV-45408r1_rule
Checks: C-42757r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download unsigned ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1004 is REG_DWORD = 3, this is not a finding.
Fix: F-38805r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download unsigned ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI024
- Vuln IDs
-
- V-6245
- Rule IDs
-
- SV-45410r1_rule
Checks: C-42760r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Initialize and script ActiveX controls not marked as safe" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1201 is REG_DWORD = 3, this is not a finding.
Fix: F-38808r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Initialize and script ActiveX controls not marked as safe" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI030
- Vuln IDs
-
- V-6248
- Rule IDs
-
- SV-45158r1_rule
Checks: C-42501r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow font downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1604 is REG_DWORD = 3, this is not a finding.
Fix: F-38554r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow font downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI031
- Vuln IDs
-
- V-6249
- Rule IDs
-
- SV-45420r2_rule
Checks: C-42770r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38817r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI032
- Vuln IDs
-
- V-6250
- Rule IDs
-
- SV-45065r1_rule
Checks: C-42438r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Access data sources across domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1406 is REG_DWORD = 3, this is not a finding.
Fix: F-38473r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Access data sources across domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI036
- Vuln IDs
-
- V-6253
- Rule IDs
-
- SV-45212r1_rule
Checks: C-42560r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow drag and drop or copy and paste files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value for 1802 is REG_DWORD = 3, this is not a finding.
Fix: F-38608r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow drag and drop or copy and paste files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI038
- Vuln IDs
-
- V-6255
- Rule IDs
-
- SV-45265r1_rule
Checks: C-42612r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Launching applications and files in an IFRAME" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1804 is REG_DWORD = 3, this is not a finding.
Fix: F-38661r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Launching applications and files in an IFRAME" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI039
- Vuln IDs
-
- V-6256
- Rule IDs
-
- SV-45280r1_rule
Checks: C-42627r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Navigate windows and frames across different domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\InternetSettings\Zones\3 Criteria: If the value 1607 is REG_DWORD = 3, this is not a finding.
Fix: F-38676r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Navigate windows and frames across different domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI042
- Vuln IDs
-
- V-6259
- Rule IDs
-
- SV-45459r1_rule
Checks: C-42807r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Userdata persistence" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1606 is REG_DWORD = 3, this is not a finding.
Fix: F-38856r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Userdata persistence" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI044
- Vuln IDs
-
- V-6260
- Rule IDs
-
- SV-45122r1_rule
Checks: C-42473r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow cut, copy or paste operations from the clipboard via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1407 is REG_DWORD = 3, this is not a finding.
Fix: F-38519r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow cut, copy or paste operations from the clipboard via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI046
- Vuln IDs
-
- V-6262
- Rule IDs
-
- SV-45273r1_rule
Checks: C-42620r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Logon options" must be "Enabled", and "Prompt for user name and password" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1A00 is REG_DWORD = 65536 (decimal), this is not a finding.
Fix: F-38669r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Logon options" to "Enabled", and select "Prompt for user name and password" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI061
- Vuln IDs
-
- V-6267
- Rule IDs
-
- SV-45250r2_rule
Checks: C-42597r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> "Java permissions" must be "Enabled", and "High Safety" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1 Criteria: If the value 1C00 is REG_DWORD = 65536, (Decimal), this is not a finding.
Fix: F-38646r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> "Java permissions" to "Enabled", and select "High Safety" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI091
- Vuln IDs
-
- V-6281
- Rule IDs
-
- SV-45251r2_rule
Checks: C-42598r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> "Java permissions" must be "Enabled", and "High Safety" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 Criteria: If the value 1C00 is REG_DWORD = 65536, (Decimal), this is not a finding.
Fix: F-38647r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> "Java permissions" to "Enabled", and select "High Safety" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI112
- Vuln IDs
-
- V-6289
- Rule IDs
-
- SV-45326r1_rule
Checks: C-42675r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download signed ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1001 is REG_DWORD = 3, this is not a finding.
Fix: F-38723r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download signed ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI113
- Vuln IDs
-
- V-6290
- Rule IDs
-
- SV-45330r1_rule
Checks: C-42679r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download unsigned ActiveX controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1004 is REG_DWORD = 3, this is not a finding.
Fix: F-38727r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download unsigned ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI114
- Vuln IDs
-
- V-6291
- Rule IDs
-
- SV-45403r1_rule
Checks: C-42752r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Initialize and script ActiveX controls not marked as safe" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1201 is REG_DWORD = 3, this is not a finding.
Fix: F-38800r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Initialize and script ActiveX controls not marked as safe" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI115
- Vuln IDs
-
- V-6292
- Rule IDs
-
- SV-45072r1_rule
Checks: C-42444r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run ActiveX controls and plugins" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1200 is REG_DWORD = 3, this is not a finding.
Fix: F-38479r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run ActiveX controls and plugins" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI116
- Vuln IDs
-
- V-6293
- Rule IDs
-
- SV-45074r1_rule
Checks: C-42446r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Script ActiveX controls marked safe for scripting" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1405 is REG_DWORD = 3, this is not a finding.
Fix: F-38481r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Script ActiveX controls marked safe for scripting" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI119
- Vuln IDs
-
- V-6294
- Rule IDs
-
- SV-45150r1_rule
Checks: C-42493r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow file downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1803 is REG_DWORD = 3, this is not a finding.
Fix: F-38546r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI120
- Vuln IDs
-
- V-6295
- Rule IDs
-
- SV-45159r1_rule
Checks: C-42503r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow font downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1604 is REG_DWORD = 3, this is not a finding.
Fix: F-38556r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow font downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI122
- Vuln IDs
-
- V-6297
- Rule IDs
-
- SV-45069r1_rule
Checks: C-42441r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Access data sources across domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1406 is REG_DWORD = 3, this is not a finding.
Fix: F-38476r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Access data sources across domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI123
- Vuln IDs
-
- V-6298
- Rule IDs
-
- SV-45324r1_rule
Checks: C-42672r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow META REFRESH" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1608 is REG_DWORD = 3, this is not a finding.
Fix: F-38720r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow META REFRESH" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI126
- Vuln IDs
-
- V-6301
- Rule IDs
-
- SV-45213r1_rule
Checks: C-42561r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow drag and drop or copy and paste files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1802 is REG_DWORD=3, this is not a finding.
Fix: F-38609r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow drag and drop or copy and paste files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI127
- Vuln IDs
-
- V-6302
- Rule IDs
-
- SV-45216r1_rule
Checks: C-42564r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow installation of desktop items" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1800 is REG_DWORD = 3, this is not a finding.
Fix: F-38612r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow installation of desktop items" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI128
- Vuln IDs
-
- V-6303
- Rule IDs
-
- SV-45267r1_rule
Checks: C-42614r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Launching applications and files in an IFRAME" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1804 is REG_DWORD = 3, this is not a finding.
Fix: F-38663r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Launching applications and files in an IFRAME" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI129
- Vuln IDs
-
- V-6304
- Rule IDs
-
- SV-45281r1_rule
Checks: C-42628r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Navigate windows and frames across different domains" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1607 is REG_DWORD = 3, this is not a finding.
Fix: F-38677r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Navigate windows and frames across different domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI132
- Vuln IDs
-
- V-6307
- Rule IDs
-
- SV-45482r1_rule
Checks: C-42831r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Userdata persistence" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1606 is REG_DWORD = 3, this is not a finding.
Fix: F-38879r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Userdata persistence" to "Enabled", and select "Disable" from the drop-down box
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI133
- Vuln IDs
-
- V-6308
- Rule IDs
-
- SV-45071r1_rule
Checks: C-42443r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow active scripting" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1400 is REG_DWORD = 3, this is not a finding.
Fix: F-38478r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow active scripting" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI134
- Vuln IDs
-
- V-6309
- Rule IDs
-
- SV-45126r1_rule
Checks: C-42474r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow cut, copy or paste operations from the clipboard via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1407 is REG_DWORD = 3, this is not a finding.
Fix: F-38522r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow cut, copy or paste operations from the clipboard via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI136
- Vuln IDs
-
- V-6311
- Rule IDs
-
- SV-45271r1_rule
Checks: C-42618r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Logon options" must be "Enabled", and "Anonymous logon" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1A00 is REG_DWORD = 196608 (decimal), this is not a finding.
Fix: F-38667r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Logon options" to "Enabled", and select "Anonymous logon" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI121
- Vuln IDs
-
- V-7007
- Rule IDs
-
- SV-45263r2_rule
Checks: C-42610r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38659r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI697
- Vuln IDs
-
- V-14245
- Rule IDs
-
- SV-45057r2_rule
Checks: C-42431r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Do Not Allow users to enable or disable add-ons" must be "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions Criteria: If the value NoExtensionManagement does not exist ("Not Configured") or the value is set to REG_DWORD = 0 ("Disabled"), this is not a finding.
Fix: F-38466r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> "Do Not Allow users to enable or disable add-ons" to "Disabled" or "Not Configured".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI305
- Vuln IDs
-
- V-15490
- Rule IDs
-
- SV-45107r1_rule
Checks: C-42464r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable changing Automatic Configuration settings" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel Criteria: If the value Autoconfig is REG_DWORD = 1 (Hex), this is not a finding.
Fix: F-38506r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable changing Automatic Configuration settings" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI315
- Vuln IDs
-
- V-15492
- Rule IDs
-
- SV-45282r1_rule
Checks: C-42629r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent participation in the Customer Experience Improvement Program" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\SQM Criteria: If the value DisableCustomerImprovementProgram is REG_DWORD = 0, this is not a finding.
Fix: F-38678r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent participation in the Customer Experience Improvement Program" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI325
- Vuln IDs
-
- V-15494
- Rule IDs
-
- SV-45302r1_rule
Checks: C-42650r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off the Security Settings Check feature" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Security Criteria: If the value DisableSecuritySettingsCheck is REG_DWORD = 0, this is not a finding.
Fix: F-38698r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off the Security Settings Check feature" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI340
- Vuln IDs
-
- V-15497
- Rule IDs
-
- SV-45070r1_rule
Checks: C-42442r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow active content from CDs to run on user machines" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings Criteria: If the value LOCALMACHINE_CD_UNLOCK is REG_DWORD = 0, this is not a finding.
Fix: F-38477r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow active content from CDs to run on user machines" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI350
- Vuln IDs
-
- V-15499
- Rule IDs
-
- SV-45311r1_rule
Checks: C-42659r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow software to run or install even if the signature is invalid" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Download Criteria: If the value RunInvalidSignatures is REG_DWORD = 0, this is not a finding.
Fix: F-38707r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow software to run or install even if the signature is invalid" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI355
- Vuln IDs
-
- V-15500
- Rule IDs
-
- SV-45445r1_rule
Checks: C-42794r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow third-party browser extensions" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Enable Browser Extensions is REG_SZ = no, this is not a finding.
Fix: F-38842r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow third-party browser extensions" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI365
- Vuln IDs
-
- V-15502
- Rule IDs
-
- SV-45335r1_rule
Checks: C-42684r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for server certificate revocation" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value CertificateRevocation is REG_DWORD = 1, this is not a finding.
Fix: F-38731r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for server certificate revocation" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI370
- Vuln IDs
-
- V-15503
- Rule IDs
-
- SV-45120r1_rule
Checks: C-42472r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for signatures on downloaded programs" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Download Criteria: If the value CheckExeSignatures is REG_SZ = yes, this is not a finding.
Fix: F-38517r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for signatures on downloaded programs" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI375
- Vuln IDs
-
- V-15504
- Rule IDs
-
- SV-45079r1_rule
Checks: C-42451r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> "Intranet Sites: Include all network paths (UNCs)" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap Criteria: If the value UNCAsIntranet is REG_DWORD = 0, this is not a finding.
Fix: F-38486r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> "Intranet Sites: Include all network paths (UNCs)" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI385
- Vuln IDs
-
- V-15507
- Rule IDs
-
- SV-45296r1_rule
Checks: C-42644r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow script-initiated windows without size or position constraints" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2102 is REG_DWORD = 3, this is not a finding.
Fix: F-38692r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow script-initiated windows without size or position constraints" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI390
- Vuln IDs
-
- V-15508
- Rule IDs
-
- SV-45297r1_rule
Checks: C-42645r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow script-initiated windows without size or position constraints" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2102 is REG_DWORD = 3, this is not a finding.
Fix: F-38693r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow script-initiated windows without size or position constraints" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI395
- Vuln IDs
-
- V-15509
- Rule IDs
-
- SV-45299r1_rule
Checks: C-42647r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow Scriptlets" must be "Enabled", and "Disable" from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1209 is REG_DWORD = 3, this is not a finding.
Fix: F-38695r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow Scriptlets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI415
- Vuln IDs
-
- V-15513
- Rule IDs
-
- SV-45108r1_rule
Checks: C-42465r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Automatic prompting for file downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2200 is REG_DWORD = 3, this is not a finding.
Fix: F-38507r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Automatic prompting for file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI425
- Vuln IDs
-
- V-15515
- Rule IDs
-
- SV-45252r2_rule
Checks: C-42599r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38648r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> "Java permissions" to "Enabled", and "Disable Java" selected from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI430
- Vuln IDs
-
- V-15516
- Rule IDs
-
- SV-45255r2_rule
Checks: C-42602r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38651r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI435
- Vuln IDs
-
- V-15517
- Rule IDs
-
- SV-45254r2_rule
Checks: C-42601r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38650r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI440
- Vuln IDs
-
- V-15518
- Rule IDs
-
- SV-45261r2_rule
Checks: C-42608r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38657r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI445
- Vuln IDs
-
- V-15519
- Rule IDs
-
- SV-45253r2_rule
Checks: C-42600r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38649r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI450
- Vuln IDs
-
- V-15520
- Rule IDs
-
- SV-45257r2_rule
Checks: C-42604r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> "Java permissions" must be "Enabled", and "Disable Java" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4 Criteria: If the value 1C00 is REG_DWORD = 0, this is not a finding.
Fix: F-38653r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI455
- Vuln IDs
-
- V-15521
- Rule IDs
-
- SV-45493r1_rule
Checks: C-42843r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow loading of XAML files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2402 is REG_DWORD = 3, this is not a finding.
Fix: F-38891r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow loading of XAML files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI460
- Vuln IDs
-
- V-15522
- Rule IDs
-
- SV-45497r1_rule
Checks: C-42846r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow loading of XAML files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2402 is REG_DWORD = 3, this is not a finding.
Fix: F-38894r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow loading of XAML files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI465
- Vuln IDs
-
- V-15523
- Rule IDs
-
- SV-45276r1_rule
Checks: C-42623r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Enable MIME Sniffing" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2100 is REG_DWORD = 3, this is not a finding.
Fix: F-38672r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Enable MIME Sniffing" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI470
- Vuln IDs
-
- V-15524
- Rule IDs
-
- SV-45278r1_rule
Checks: C-42625r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Enable MIME Sniffing" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2100 is REG_DWORD = 3, this is not a finding.
Fix: F-38674r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Enable MIME Sniffing" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI475
- Vuln IDs
-
- V-15525
- Rule IDs
-
- SV-45155r1_rule
Checks: C-42498r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn off first-run prompt" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1208 is REG_DWORD = 3, this is not a finding.
Fix: F-38551r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn off first-run prompt" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI480
- Vuln IDs
-
- V-15526
- Rule IDs
-
- SV-45157r1_rule
Checks: C-42500r2_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn off first-run prompt" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1208 is REG_DWORD = 3, this is not a finding.
Fix: F-38553r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn off first-run prompt" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI485
- Vuln IDs
-
- V-15527
- Rule IDs
-
- SV-45288r1_rule
Checks: C-42635r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Protected Mode" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2500 is REG_DWORD = 0, this is not a finding.
Fix: F-38684r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Protected Mode" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI490
- Vuln IDs
-
- V-15528
- Rule IDs
-
- SV-45290r1_rule
Checks: C-42637r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Protected Mode" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2500 is REG_DWORD = 0, this is not a finding.
Fix: F-38686r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Protected Mode" to "Enabled" and select "Enable", from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI495
- Vuln IDs
-
- V-15529
- Rule IDs
-
- SV-45283r1_rule
Checks: C-42630r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Use Pop-up Blocker" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1809 is REG_DWORD = 0, this is not a finding.
Fix: F-38679r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Use Pop-up Blocker" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI500
- Vuln IDs
-
- V-15530
- Rule IDs
-
- SV-45284r1_rule
Checks: C-42631r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Use Pop-up Blocker" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1809 is REG_DWORD = 0, this is not a finding.
Fix: F-38680r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Use Pop-up Blocker" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI515
- Vuln IDs
-
- V-15533
- Rule IDs
-
- SV-45486r1_rule
Checks: C-42835r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Web sites in less privileged Web content zones can navigate into this zone" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2101 is REG_DWORD = 3, this is not a finding.
Fix: F-38883r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Web sites in less privileged Web content zones can navigate into this zone" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI520
- Vuln IDs
-
- V-15534
- Rule IDs
-
- SV-45489r1_rule
Checks: C-42838r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Web sites in less privileged Web content zones can navigate into this zone" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2101 is REG_DWORD = 3, this is not a finding.
Fix: F-38886r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Web sites in less privileged Web content zones can navigate into this zone" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI575
- Vuln IDs
-
- V-15545
- Rule IDs
-
- SV-45098r1_rule
Checks: C-42456r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow binary and script behaviors" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2000 is REG_DWORD = 3, this is not a finding.
Fix: F-38498r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow binary and script behaviors" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI580
- Vuln IDs
-
- V-15546
- Rule IDs
-
- SV-45111r1_rule
Checks: C-42466r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Automatic prompting for file downloads" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2200 is REG_DWORD = 3, this is not a finding.
Fix: F-38508r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Automatic prompting for file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI590
- Vuln IDs
-
- V-15548
- Rule IDs
-
- SV-45224r1_rule
Checks: C-42572r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38620r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI595
- Vuln IDs
-
- V-15549
- Rule IDs
-
- SV-45227r1_rule
Checks: C-42575r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38623r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI600
- Vuln IDs
-
- V-15550
- Rule IDs
-
- SV-45228r1_rule
Checks: C-42576r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38624r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI605
- Vuln IDs
-
- V-15551
- Rule IDs
-
- SV-45229r1_rule
Checks: C-42577r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38625r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI610
- Vuln IDs
-
- V-15552
- Rule IDs
-
- SV-45244r1_rule
Checks: C-42593r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38640r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI630
- Vuln IDs
-
- V-15556
- Rule IDs
-
- SV-45236r1_rule
Checks: C-42584r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38632r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI635
- Vuln IDs
-
- V-15557
- Rule IDs
-
- SV-45234r1_rule
Checks: C-42582r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38630r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI640
- Vuln IDs
-
- V-15558
- Rule IDs
-
- SV-45235r1_rule
Checks: C-42583r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38631r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI645
- Vuln IDs
-
- V-15559
- Rule IDs
-
- SV-45241r1_rule
Checks: C-42590r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38637r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI650
- Vuln IDs
-
- V-15560
- Rule IDs
-
- SV-45049r1_rule
Checks: C-42427r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components not signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2004 is REG_DWORD = 3, this is not a finding.
Fix: F-38461r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components not signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI655
- Vuln IDs
-
- V-15561
- Rule IDs
-
- SV-45054r1_rule
Checks: C-42430r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2001 is REG_DWORD = 3, this is not a finding.
Fix: F-38464r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI670
- Vuln IDs
-
- V-15562
- Rule IDs
-
- SV-45294r2_rule
Checks: C-42642r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Scripting of Java applets" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1402 is REG_DWORD = 3, this is not a finding.
Fix: F-38690r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Scripting of Java applets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI675
- Vuln IDs
-
- V-15563
- Rule IDs
-
- SV-45439r1_rule
Checks: C-42788r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" must be "Enabled" with a "blank or empty" selection box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: The Update_Check_Page value must exist. The value must contain no data value. If the value Update_Check_Page is not present, this is a finding.
Fix: F-38836r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" to "Enabled" with a "blank or empty" selection box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI680
- Vuln IDs
-
- V-15564
- Rule IDs
-
- SV-45435r1_rule
Checks: C-42784r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent specifying the update check interval (in days)" must be "Enabled", and "30" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Update_Check_Interval is REG_DWORD = 30 (Decimal), this is not a finding.
Fix: F-38832r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent specifying the update check interval (in days)" to "Enabled", and select "30" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI592
- Vuln IDs
-
- V-15565
- Rule IDs
-
- SV-45222r1_rule
Checks: C-42570r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38618r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI594
- Vuln IDs
-
- V-15566
- Rule IDs
-
- SV-45223r1_rule
Checks: C-42571r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38619r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI599
- Vuln IDs
-
- V-15568
- Rule IDs
-
- SV-45230r1_rule
Checks: C-42578r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38626r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI612
- Vuln IDs
-
- V-15569
- Rule IDs
-
- SV-45242r1_rule
Checks: C-42591r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38638r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI614
- Vuln IDs
-
- V-15570
- Rule IDs
-
- SV-45243r1_rule
Checks: C-42592r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38639r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI647
- Vuln IDs
-
- V-15571
- Rule IDs
-
- SV-45237r1_rule
Checks: C-42585r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38633r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI649
- Vuln IDs
-
- V-15572
- Rule IDs
-
- SV-45240r1_rule
Checks: C-42589r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38636r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI690
- Vuln IDs
-
- V-15574
- Rule IDs
-
- SV-45099r1_rule
Checks: C-42457r1_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable AutoComplete for forms" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Use FormSuggest is REG_SZ = no, this is not a finding.
Fix: F-38499r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable AutoComplete for forms" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI715
- Vuln IDs
-
- V-15579
- Rule IDs
-
- SV-45130r1_rule
Checks: C-42476r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Crash Detection" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key:HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions Criteria: If the value NoCrashDetection is REG_DWORD = 1, this is not a finding.
Fix: F-38526r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Crash Detection" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI725
- Vuln IDs
-
- V-15581
- Rule IDs
-
- SV-45101r1_rule
Checks: C-42458r1_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on the auto-complete feature for user names and passwords on forms" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value FormSuggest Passwords is REG_SZ = no, this is not a finding. AND Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value FormSuggest PW Ask is REG_SZ = no, this is not a finding.
Fix: F-38500r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on the auto-complete feature for user names and passwords on forms" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI596
- Vuln IDs
-
- V-15603
- Rule IDs
-
- SV-45225r1_rule
Checks: C-42573r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38621r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI597
- Vuln IDs
-
- V-15604
- Rule IDs
-
- SV-45226r1_rule
Checks: C-42574r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38622r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI010
- Vuln IDs
-
- V-17296
- Rule IDs
-
- SV-45152r1_rule
Checks: C-42495r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent running First Run Wizard" must be "Enabled", and "Go directly to home page" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DisableFirstRunCustomize is REG_DWORD = 1, this is not a finding.
Fix: F-38548r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent running First Run Wizard" to "Enabled", and select "Go directly to home page" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI300
- Vuln IDs
-
- V-21887
- Rule IDs
-
- SV-45128r1_rule
Checks: C-42475r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Disable Configuring History" must be "Enabled", and "40" entered in 'Days to keep pages in History'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel Criteria: If the value History is REG_DWORD = 1, this is not a finding. AND Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Url History Criteria: If the value DaysToKeep is REG_DWORD = 40 (decimal), this is not a finding.
Fix: F-38525r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Disable Configuring History" to "Enabled", and enter "40" in 'Days to keep pages in History'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI740
- Vuln IDs
-
- V-22108
- Rule IDs
-
- SV-45275r1_rule
Checks: C-42622r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent Managing SmartScreen Filter" must be "Enabled", and "Off" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\PhishingFilter Criteria: If the value EnabledV9 is REG_DWORD = 0, this is not a finding.
Fix: F-38671r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> " Prevent Managing SmartScreen Filter" to "Enabled", and select "Off" from the drop-down box.
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI750
- Vuln IDs
-
- V-22147
- Rule IDs
-
- SV-45449r1_rule
Checks: C-42798r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Compatibility View -> "Include updated Web site lists from Microsoft" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\BrowserEmulation Criteria: If the value MSCompatibilityMode is REG_DWORD = 0, this is not a finding.
Fix: F-38846r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Compatibility View -> "Include updated Web site lists from Microsoft" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI760
- Vuln IDs
-
- V-22148
- Rule IDs
-
- SV-45115r1_rule
Checks: C-42470r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Allow deleting browsing history on exit" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value ClearBrowsingHistoryOnExit is REG_DWORD = 0, this is not a finding.
Fix: F-38511r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Allow deleting browsing history on exit" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI770
- Vuln IDs
-
- V-22149
- Rule IDs
-
- SV-45137r1_rule
Checks: C-42481r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Prevent Deleting Web sites that the User has Visited" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value CleanHistory is REG_DWORD = 0, this is not a finding.
Fix: F-38534r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Prevent Deleting Web sites that the User has Visited" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI780
- Vuln IDs
-
- V-22150
- Rule IDs
-
- SV-45214r1_rule
Checks: C-42562r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Privacy -> "Turn off InPrivate Browsing" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value EnableInPrivateBrowsing is REG_DWORD = 0, this is not a finding.
Fix: F-38610r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Privacy -> "Turn off InPrivate Browsing" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI800
- Vuln IDs
-
- V-22152
- Rule IDs
-
- SV-45293r1_rule
Checks: C-42641r4_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow scripting of Internet Explorer WebBrowser controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1206 is REG_DWORD = 3, this is not a finding.
Fix: F-38689r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow scripting of Internet Explorer WebBrowser controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI810
- Vuln IDs
-
- V-22153
- Rule IDs
-
- SV-45490r1_rule
Checks: C-42839r2_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Include local path when user is uploading files to a server" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 160A is REG_DWORD = 3, this is not a finding.
Fix: F-38887r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Include local path when user is uploading files to a server" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI820
- Vuln IDs
-
- V-22154
- Rule IDs
-
- SV-45306r1_rule
Checks: C-42654r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Show security warning for potentially unsafe files" must be "Enabled", and "Prompt" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1806 is REG_DWORD = 1, this is not a finding.
Fix: F-38702r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Show security warning for potentially unsafe files" to "Enabled", and select "Prompt" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI830
- Vuln IDs
-
- V-22155
- Rule IDs
-
- SV-45075r1_rule
Checks: C-42447r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> " Allow only approved domains to use ActiveX controls without prompt" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 120b is REG_DWORD = 3, this is not a finding.
Fix: F-38482r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow only approved domains to use ActiveX controls without prompt" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI840
- Vuln IDs
-
- V-22156
- Rule IDs
-
- SV-45131r1_rule
Checks: C-42477r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Cross-Site Scripting (XSS) Filter" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 1409 is REG_DWORD = 0, this is not a finding.
Fix: F-38528r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Cross-Site Scripting (XSS) Filter" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI850
- Vuln IDs
-
- V-22157
- Rule IDs
-
- SV-45291r1_rule
Checks: C-42639r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow scripting of Internet Explorer WebBrowser controls" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1206 is REG_DWORD = 3, this is not a finding.
Fix: F-38687r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow scripting of Internet Explorer WebBrowser controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI860
- Vuln IDs
-
- V-22158
- Rule IDs
-
- SV-45491r1_rule
Checks: C-42840r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Include local path when user is uploading files to a server" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 160A is REG_DWORD = 3, this is not a finding.
Fix: F-38889r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Include local path when user is uploading files to a server" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI870
- Vuln IDs
-
- V-22159
- Rule IDs
-
- SV-45309r1_rule
Checks: C-42658r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Show security warning for potentially unsafe files" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1806 is REG_DWORD = 3, this is not a finding.
Fix: F-38706r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Show security warning for potentially unsafe files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI880
- Vuln IDs
-
- V-22160
- Rule IDs
-
- SV-45076r1_rule
Checks: C-42448r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow only approved domains to use ActiveX controls without prompt" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 120b is REG_DWORD = 3, this is not a finding.
Fix: F-38483r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow only approved domains to use ActiveX controls without prompt" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI890
- Vuln IDs
-
- V-22161
- Rule IDs
-
- SV-45133r1_rule
Checks: C-42478r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Cross-Site Scripting (XSS) Filter" must be "Enabled", and "Enable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1409 is REG_DWORD = 0, this is not a finding.
Fix: F-38529r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Cross-Site Scripting (XSS) Filter" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI900
- Vuln IDs
-
- V-22171
- Rule IDs
-
- SV-45249r1_rule
Checks: C-42596r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38645r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI910
- Vuln IDs
-
- V-22634
- Rule IDs
-
- SV-45314r1_rule
Checks: C-42662r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Allow updates to status bar via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2103 is REG_DWORD = 3, this is not a finding.
Fix: F-38710r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Allow updates to status bar via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI920
- Vuln IDs
-
- V-22635
- Rule IDs
-
- SV-45047r1_rule
Checks: C-42426r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components not signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2004 is REG_DWORD = 3, this is not a finding.
Fix: F-38460r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components not signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI930
- Vuln IDs
-
- V-22636
- Rule IDs
-
- SV-45053r1_rule
Checks: C-42429r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components signed with Authenticode" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2001 is REG_DWORD = 3, this is not a finding.
Fix: F-38463r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI940
- Vuln IDs
-
- V-22637
- Rule IDs
-
- SV-45301r1_rule
Checks: C-42649r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow Scriptlets" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 1209 is REG_DWORD = 3, this is not a finding.
Fix: F-38697r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow Scriptlets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI950
- Vuln IDs
-
- V-22638
- Rule IDs
-
- SV-45318r1_rule
Checks: C-42667r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow updates to status bar via script" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2103 is REG_DWORD = 3, this is not a finding.
Fix: F-38714r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow updates to status bar via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1010
- Vuln IDs
-
- V-22687
- Rule IDs
-
- SV-45475r1_rule
Checks: C-42824r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38872r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1020
- Vuln IDs
-
- V-22688
- Rule IDs
-
- SV-45473r1_rule
Checks: C-42822r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38870r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI745
- Vuln IDs
-
- V-30774
- Rule IDs
-
- SV-45078r1_rule
Checks: C-42450r2_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off add-on performance notifications" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Ext Criteria: If the value DisableAddonLoadTimePerformanceNotifications is REG_DWORD = 1, this is not a finding.
Fix: F-38485r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off add-on performance notifications" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI755
- Vuln IDs
-
- V-30775
- Rule IDs
-
- SV-45112r1_rule
Checks: C-42467r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Browser Geolocation" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Geolocation Criteria: If the value PolicyDisableGeolocation is REG_DWORD = 1, this is not a finding.
Fix: F-38509r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Browser Geolocation" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI765
- Vuln IDs
-
- V-30776
- Rule IDs
-
- SV-45321r1_rule
Checks: C-42669r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on Suggested Sites" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Suggested Sites Criteria: If the value Enabled is REG_DWORD = 0, this is not a finding.
Fix: F-38717r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on Suggested Sites" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI775
- Vuln IDs
-
- V-30777
- Rule IDs
-
- SV-45103r1_rule
Checks: C-42460r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel-> Advanced Page-> "Automatically check for Internet Explorer updates" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value NoUpdateCheck is REG_DWORD = 1, this is not a finding.
Fix: F-38502r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel-> Advanced Page-> "Automatically check for Internet Explorer updates" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI805
- Vuln IDs
-
- V-30778
- Rule IDs
-
- SV-45077r1_rule
Checks: C-42449r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off ActiveX opt-in prompt" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Ext Criteria: If the value NoFirsttimeprompt is REG_DWORD = 1, this is not a finding.
Fix: F-38484r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off ActiveX opt-in prompt" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI815
- Vuln IDs
-
- V-30779
- Rule IDs
-
- SV-45233r1_rule
Checks: C-42581r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value (Reserved) is REG_SZ = 1, this is not a finding.
Fix: F-38629r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI825
- Vuln IDs
-
- V-30780
- Rule IDs
-
- SV-45231r1_rule
Checks: C-42579r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-38627r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI835
- Vuln IDs
-
- V-30781
- Rule IDs
-
- SV-45232r1_rule
Checks: C-42580r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value iexplore.exe is REG_SZ = 1, this is not a finding.
Fix: F-38628r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI018
- Vuln IDs
-
- V-32808
- Rule IDs
-
- SV-45116r1_rule
Checks: C-42471r1_chk
Open Internet Explorer. From the menu bar select Tools. From the Tools drop-down menu, select Internet Options. From the Internet Options window, select the Advanced tab, from the Advanced tab window scroll down to the Security category, verify a check mark is placed in the "Check for publisher's certificate revocation" box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Criteria: If the value State is REG_DWORD = 65536 (decimal), this is not a finding.
Fix: F-38512r2_fix
Check mark the option to enable "Check for publisher's certificate revocation" in the Internet Explorer Options, Advanced page. NOTE: Manual entry for the value State, set to REG_DWORD = 65536, may first be required.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1040
- Vuln IDs
-
- V-34414
- Rule IDs
-
- SV-45046r1_rule
Checks: C-42425r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Always send Do Not Track header" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DoNotTrack is REG_DWORD = 1, this is not a finding.
Fix: F-38459r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Always send Do Not Track header" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI980
- Vuln IDs
-
- V-34425
- Rule IDs
-
- SV-45063r1_rule
Checks: C-42436r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Install new versions of Internet Explorer automatically" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value EnableAutoUpgrade is REG_DWORD = 0, this is not a finding.
Fix: F-38471r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Install new versions of Internet Explorer automatically" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1035
- Vuln IDs
-
- V-34456
- Rule IDs
-
- SV-45140r1_rule
Checks: C-42483r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Security Features "Do not display the reveal password button" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DisablePasswordReveal is REG_DWORD = 1, this is not a finding.
Fix: F-38536r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Security Features "Do not display the reveal password button" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI990
- Vuln IDs
-
- V-34457
- Rule IDs
-
- SV-45142r1_rule
Checks: C-42485r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains across windows" must be "Enabled", and "Disabled" selected. Procedure: Use the windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2709 is REG_DWORD = 3, this is not a finding.
Fix: F-38538r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains across windows" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1005
- Vuln IDs
-
- V-34458
- Rule IDs
-
- SV-45143r1_rule
Checks: C-42486r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains across windows" must be "Enabled", and "Disabled" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2709 is REG_DWORD = 3, this is not a finding.
Fix: F-38539r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains across windows" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1000
- Vuln IDs
-
- V-34459
- Rule IDs
-
- SV-45144r1_rule
Checks: C-42487r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains within a window" must be "Enabled", and "Disabled" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 2708 is REG_DWORD = 3, this is not a finding.
Fix: F-38540r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains within a window" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1025
- Vuln IDs
-
- V-34460
- Rule IDs
-
- SV-45146r1_rule
Checks: C-42489r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains within a window" must be "Enabled", and "Disabled" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 2708 is REG_DWORD = 3, this is not a finding.
Fix: F-38542r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains within a window" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI995
- Vuln IDs
-
- V-34461
- Rule IDs
-
- SV-45147r1_rule
Checks: C-42490r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Turn on Enhanced Protected Mode" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Isolation is REG_SZ = PMEM, this is not a finding.
Fix: F-38543r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Turn on Enhanced Protected Mode" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1055
- Vuln IDs
-
- V-34474
- Rule IDs
-
- SV-45217r1_rule
Checks: C-42565r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Accelerators "Turn off Accelerators" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Activities Criteria: If the value NoActivities is REG_DWORD = 1, this is not a finding.
Fix: F-38613r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Accelerators "Turn off Accelerators" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1045
- Vuln IDs
-
- V-34489
- Rule IDs
-
- SV-45269r1_rule
Checks: C-42616r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Render Legacy Filters" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value 270B is REG_DWORD = 3, this is not a finding.
Fix: F-38665r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Render Legacy Filters" to "Enabled", and select "Disable".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1050
- Vuln IDs
-
- V-34490
- Rule IDs
-
- SV-45270r1_rule
Checks: C-42617r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Render Legacy Filters" must be "Enabled", and "Disable" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value 270B is REG_DWORD = 3, this is not a finding.
Fix: F-38666r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Render Legacy Filters" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1030
- Vuln IDs
-
- V-34590
- Rule IDs
-
- SV-45454r1_rule
Checks: C-42803r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Settings-> AutoComplete "Turn off URL Suggestions" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\DomainSuggestion Criteria: If the value Enabled is REG_DWORD = 0, this is not a finding.
Fix: F-38851r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Settings-> AutoComplete "Turn off URL Suggestions" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI985
- Vuln IDs
-
- V-34610
- Rule IDs
-
- SV-45478r1_rule
Checks: C-42826r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value DisableEPMCompat is REG_DWORD = 1, this is not a finding.
Fix: F-38875r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" to "Enabled".