Microsoft Internet Explorer 10 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 142
Comparison against the immediately-prior release (V1R5). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 142
- V-14245 Low check Ability for users to enable or disable add-ons must be enforced.
- V-15490 Medium check Automatic configuration of Internet Explorer connections must be disallowed.
- V-15492 Medium check Participation in the Customer Experience Improvement Program must be disallowed.
- V-15494 Medium check Security checking features must be enforced.
- V-15497 Medium check Active content from CDs must be disallowed to run on user machines.
- V-15499 Medium descriptioncheck Software must be disallowed to run or install with invalid signatures.
- V-15500 Medium check Third-party browser extensions must be disallowed.
- V-15502 Medium check Checking for server certificate revocation must be enforced.
- V-15503 Medium check Checking for signatures on downloaded programs must be enforced.
- V-15504 Medium check All network paths (UNCs) for Intranet sites must be disallowed.
- V-15507 Medium check Script-initiated windows without size or position constraints must be disallowed (Internet zone).
- V-15508 Medium check Script-initiated windows without size or position constraints must be disallowed (Restricted Sites zone).
- V-15509 Medium check Scriptlets must be disallowed (Internet zone).
- V-15513 Medium check Automatic prompting for file downloads must be disallowed (Internet zone).
- V-15515 Medium check Java permissions must be disallowed (Local Machine zone).
- V-15516 Medium check Java permissions must be disallowed (Locked Down Local Machine zone).
- V-15517 Medium check Java permissions must be disallowed (Locked Down Intranet zone).
- V-15518 Medium check Java permissions must be disallowed (Locked Down Trusted Sites zone).
- V-15519 Medium check Java permissions must be disallowed (Locked Down Internet zone).
- V-15520 Medium check Java permissions must be disallowed (Locked Down Restricted Sites zone).
- V-15521 Medium check XAML files must be disallowed (Internet zone).
- V-15522 Medium check XAML files must be disallowed (Restricted Sites zone).
- V-15523 Medium check MIME sniffing must be disallowed (Internet zone).
- V-15524 Medium check MIME sniffing must be disallowed (Restricted Sites zone).
- V-15525 Medium check First-Run prompt ability must be disallowed (Internet zone).
- V-15526 Medium check First-Run prompt ability must be disallowed (Restricted Sites zone).
- V-15527 Medium check Protected Mode must be enforced (Internet zone).
- V-15528 Medium check Protected Mode must be enforced (Restricted Sites zone).
- V-15529 Medium check Pop-up Blocker must be enforced (Internet zone).
- V-15530 Medium check Pop-up Blocker must be enforced (Restricted Sites zone).
- V-15533 Medium check Websites in less privileged web content zones must be prevented from navigating into the Internet zone.
- V-15534 Medium check Websites in less privileged web content zones must be prevented from navigating into the Restricted Sites zone.
- V-15545 Medium check Allow binary and script behaviors must be disallowed (Restricted Sites zone).
- V-15546 Medium check Automatic prompting for file downloads must be disallowed (Restricted Sites zone).
- V-15548 Medium check Internet Explorer Processes for MIME handling is not enabled. (Reserved)
- V-15549 Medium check Internet Explorer Processes for MIME sniffing must be enforced (Reserved).
- V-15550 Medium check Internet Explorer Processes for MK protocol must be enforced (Explorer).
- V-15551 Medium check Internet Explorer Processes for MK protocol must be enforced (IExplore).
- V-15552 Medium check Internet Explorer Processes for Zone Elevation must be enforced (Reserved).
- V-15556 Medium check Internet Explorer Processes for Restrict File Download must be enforced (Reserved).
- V-15557 Medium check Internet Explorer Processes for Restrict File Download must be enforced (Explorer).
- V-15558 Medium check Internet Explorer Processes for Restrict File Download must be enforced (IExplore).
- V-15559 Medium check Internet Explorer Processes for restricting pop-up windows must be enforced (Reserved).
- V-15560 Medium check .NET Framework-reliant components not signed with Authenticode must be disallowed to run (Restricted Sites Zone).
- V-15561 Medium check .NET Framework-reliant components signed with Authenticode must be disallowed to run (Restricted Sites Zone).
- V-15562 Medium check Scripting of Java applets must be disallowed (Restricted Sites zone).
- V-15563 Medium check The URL to be displayed for checking updates to Internet Explorer and Internet Tools must be about:blank.
- V-15564 Medium check The update check interval must be configured and set to 30 days.
- V-15565 Medium check Internet Explorer Processes for MIME handling must be enforced (Explorer).
- V-15566 Medium check Internet Explorer Processes for MIME handling must be enforced (IExplore).
- V-15568 Medium check Internet Explorer Processes for MK protocol must be enforced (Reserved).
- V-15569 Medium check Internet Explorer Processes for Zone Elevation must be enforced (Explorer).
- V-15570 Medium check Internet Explorer Processes for Zone Elevation must be enforced (IExplore).
- V-15571 Medium check Internet Explorer Processes for restricting pop-up windows must be enforced (Explorer).
- V-15572 Medium check Internet Explorer Processes for restricting pop-up windows must be enforced (IExplore).
- V-15579 Medium check Crash Detection management must be enforced.
- V-15603 Medium check Internet Explorer Processes for MIME sniffing must be enforced (Explorer).
- V-15604 Medium check Internet Explorer Processes for MIME sniffing must be enforced (IExplore).
- V-17296 Medium check First Run Wizard settings must be established for a home page.
- V-21887 Medium check Configuring History setting must be set to 40 days.
- V-22108 Medium check Managing SmartScreen Filter use must be enforced.
- V-22147 Low check Updates to website lists from Microsoft must be disallowed.
- V-22148 Medium check Browser must retain history on exit.
- V-22149 Medium check Deleting websites that the user has visited must be disallowed.
- V-22150 Medium check InPrivate Browsing must be disallowed.
- V-22152 Medium check Scripting of Internet Explorer WebBrowser control property must be disallowed (Internet zone).
- V-22153 Medium check When uploading files to a server, the local directory path must be excluded (Internet zone).
- V-22154 Medium check Security Warning for unsafe files must be set to prompt (Internet zone).
- V-22155 Medium check ActiveX controls without prompt property must be used in approved domains only (Internet zone).
- V-22156 Medium check Cross-Site Scripting (XSS) Filter must be enforced (Internet zone).
- V-22157 Medium check Scripting of Internet Explorer WebBrowser control must be disallowed (Restricted Sites zone).
- V-22158 Medium check When uploading files to a server, the local directory path must be excluded (Restricted Sites zone).
- V-22159 Medium check Security Warning for unsafe files must be disallowed (Restricted Sites zone).
- V-22160 Medium check ActiveX controls without prompt property must be used in approved domains only (Restricted Sites zone).
- V-22161 Medium check Cross-Site Scripting (XSS) Filter property must be enforced (Restricted Sites zone).
- V-22171 Medium check Internet Explorer Processes Restrict ActiveX Install must be enforced (Reserved).
- V-22634 Medium check Status bar updates via script must be disallowed (Internet zone).
- V-22635 Medium check .NET Framework-reliant components not signed with Authenticode must be disallowed to run (Internet zone).
- V-22636 Medium check .NET Framework-reliant components signed with Authenticode must be disallowed to run (Internet zone).
- V-22637 Medium check Scriptlets must be disallowed (Restricted Sites zone).
- V-22638 Medium check Status bar updates via script must be disallowed (Restricted Sites zone).
- V-22687 Medium check Internet Explorer Processes Restrict ActiveX Install must be enforced (Explorer).
- V-22688 Medium check Internet Explorer Processes Restrict ActiveX Install must be enforced (IExplore).
- V-30774 Medium check Add-on performance notifications must be disallowed.
- V-30775 Medium check Browser Geolocation functionality must be disallowed.
- V-30776 Medium check Suggested Sites functionality must be disallowed.
- V-30777 Medium check Automatic checking for Internet Explorer updates must be disallowed.
- V-30778 Medium check ActiveX opt-in prompt must be disallowed.
- V-30779 Medium check Internet Explorer Processes for Notification Bars must be enforced (Reserved).
- V-30780 Medium check Internet Explorer Processes for Notification Bars must be enforced (Explorer).
- V-30781 Medium check Internet Explorer Processes for Notification Bars must be enforced (IExplore).
- V-32808 Medium checkfix Check for publishers certificate revocation must be enforced.
- V-3427 Medium check Internet Explorer must be configured to use machine settings.
- V-3428 Medium check Internet Explorer must be configured to disallow users to change policies.
- V-3429 Medium check Internet Explorer must be set to disallow users to add/delete sites.
- V-3430 Low check Internet Explorer must be configured to make proxy settings per user.
- V-34414 Medium check Do Not Track header must be sent.
- V-34425 Medium check Ability to install new versions of Internet Explorer automatically must be disallowed.
- V-34456 Medium check Displaying of the reveal password button must be disallowed.
- V-34457 Medium check Dragging of content from different domains across windows must be disallowed (Internet zone).
- V-34458 Medium check Dragging of content from different domains across windows must be disallowed (Restricted Sites zone).
- V-34459 Medium check Dragging of content from different domains within a window must be disallowed (Internet zone).
- V-34460 Medium check Dragging of content from different domains within a window must be disallowed (Restricted Sites zone).
- V-34461 Medium check Enhanced protected mode functionality must be enforced.
- V-34474 Medium check Internet Explorer accelerator functionality must be disallowed.
- V-34489 Medium check Legacy filter functionality must be disallowed (Internet zone).
- V-34490 Medium check Legacy filter functionality must be disallowed (Restricted Sites zone).
- V-34590 Medium check URL Suggestions must be disallowed.
- V-34610 Medium check When enhanced protected mode is enabled, ActiveX controls must be disallowed to run in protected mode.
- V-6239 Medium check The Internet Explorer warning about certificate address mismatch must be enforced.
- V-6243 Medium check The Download signed ActiveX controls property must be disallowed (Internet zone).
- V-6244 Medium check The Download unsigned ActiveX controls property must be disallowed (Internet zone).
- V-6245 Medium check The Initialize and script ActiveX controls not marked as safe property must be disallowed (Internet zone).
- V-6248 Medium check Font downloads must be disallowed (Internet zone).
- V-6249 Medium check The Java permissions must be disallowed (Internet zone).
- V-6250 Medium check Accessing data sources across domains must be disallowed (Internet zone).
- V-6253 Medium check Functionality to drag and drop or copy and paste files must be disallowed (Internet zone).
- V-6255 Medium check Launching programs and files in IFRAME must be disallowed (Internet zone).
- V-6256 Medium check Navigating windows and frames across different domains must be disallowed (Internet zone).
- V-6259 Medium check Userdata persistence must be disallowed (Internet zone).
- V-6260 Medium check Clipboard operations via script must be disallowed (Internet zone).
- V-6262 Medium check Logon options must be configured to prompt (Internet zone).
- V-6267 Medium check Java permissions must be configured with High Safety (Intranet zone).
- V-6281 Medium check Java permissions must be configured with High Safety (Trusted Sites zone).
- V-6289 Medium check The Download signed ActiveX controls property must be disallowed (Restricted Sites zone).
- V-6290 Medium check The Download unsigned ActiveX controls property must be disallowed (Restricted Sites zone).
- V-6291 Medium check The Initialize and script ActiveX controls not marked as safe property must be disallowed (Restricted Sites zone).
- V-6292 Medium check ActiveX controls and plug-ins must be disallowed (Restricted Sites zone).
- V-6293 Medium check ActiveX controls marked safe for scripting must be disallowed (Restricted Sites zone).
- V-6294 Medium check File downloads must be disallowed (Restricted Sites zone).
- V-6295 Medium check Font downloads must be disallowed (Restricted Sites zone).
- V-6297 Medium check Accessing data sources across domains must be disallowed (Restricted Sites zone).
- V-6298 Medium check The Allow META REFRESH property must be disallowed (Restricted Sites zone).
- V-6301 Medium check Functionality to drag and drop or copy and paste files must be disallowed (Restricted Sites zone).
- V-6302 Medium check Installation of desktop items must be disallowed (Restricted Sites zone).
- V-6303 Medium check Launching programs and files in IFRAME must be disallowed (Restricted Sites zone).
- V-6304 Medium check Navigating windows and frames across different domains must be disallowed (Restricted Sites zone).
- V-6307 Medium check Rule Title: Userdata persistence must be disallowed (Restricted Sites zone).
- V-6308 Medium check Active scripting must be disallowed (Restricted Sites Zone).
- V-6309 Medium check Clipboard operations via script must be disallowed (Restricted Sites zone).
- V-6311 Medium check Logon options must be configured and enforced (Restricted Sites zone).
- V-7007 Medium check Java permissions must be disallowed (Restricted Sites zone).
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI320
- Vuln IDs
-
- V-3427
- Rule IDs
-
- SV-45220r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38616r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Use only machine settings" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI319
- Vuln IDs
-
- V-3428
- Rule IDs
-
- SV-45218r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38614r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to change policies" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI318
- Vuln IDs
-
- V-3429
- Rule IDs
-
- SV-45221r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38617r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Security Zones: Do not allow users to add/delete sites" to "Enabled".
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI367
- Vuln IDs
-
- V-3430
- Rule IDs
-
- SV-45219r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38615r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Make proxy settings per-machine (rather than per user)" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI001
- Vuln IDs
-
- V-6228
- Rule IDs
-
- SV-6278r3_rule
Checks: C-170r2_chk
Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Microsoft\Internet Explorer\Main Criteria: If the value Start Page is about:blank or a trusted site this is not a finding.
Fix: F-131r2_fix
Change Start Page value to about:blank or a trusted site.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI014
- Vuln IDs
-
- V-6238
- Rule IDs
-
- SV-45415r3_rule
Checks: C-42764r4_chk
Open Internet Explorer. From the menu bar, select Tools. From the Tools drop-down menu, select Internet Options. From the Internet Options window, select the Advanced tab, from the Advanced tab window scroll down to the Security category. Verify a check mark is placed in 'Use SSL 3.0' and 'Use TLS 1.0' check boxes. Check marks can also be placed in 'Use TLS 1.1' and/or 'Use TLS 1.2'. If so, this is acceptable and not a finding. Verify there is not a check placed in the check box for 'Use SSL 2.0'. If 'Use SSL 2.0' is checked, then this is a finding. The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page-> 'Turn off Encryption Support' must be 'Enabled' and ensure the option selected includes 'Use SSL 3.0 and TLS 1.0' from the drop-down box. If 'TLS 1.1' and/or 'TLS 1.2' is also included in the option, this is not a finding. If the selected option contains 'SSL 2.0', then this is a finding.
Fix: F-38812r4_fix
Open Internet Explorer. From the menu bar, select Tools. From the Tools drop-down menu, select Internet Options. From the Internet Options window, select the Advanced tab, from the Advanced tab window scroll down to the Security category. Place a check mark in 'Use SSL 3.0' and 'Use TLS 1.0' check boxes. Check marks can also be placed in 'Use TLS 1.1' and/or 'Use TLS 1.2'. Uncheck 'Use SSL 2.0' option. Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page-> 'Turn off Encryption Support' to 'Enabled' and select 'Use SSL 3.0 and TLS 1.0' from the drop down box. The option may also include 'TLS 1.1' and/or 'TLS 1.2'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI015
- Vuln IDs
-
- V-6239
- Rule IDs
-
- SV-45417r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38815r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page "Turn on certificate address mismatch warning" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI022
- Vuln IDs
-
- V-6243
- Rule IDs
-
- SV-45406r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38804r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download signed ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI023
- Vuln IDs
-
- V-6244
- Rule IDs
-
- SV-45408r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38805r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Download unsigned ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI024
- Vuln IDs
-
- V-6245
- Rule IDs
-
- SV-45410r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38808r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Initialize and script ActiveX controls not marked as safe" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI030
- Vuln IDs
-
- V-6248
- Rule IDs
-
- SV-45158r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38554r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow font downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI031
- Vuln IDs
-
- V-6249
- Rule IDs
-
- SV-45420r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38817r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI032
- Vuln IDs
-
- V-6250
- Rule IDs
-
- SV-45065r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38473r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Access data sources across domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI036
- Vuln IDs
-
- V-6253
- Rule IDs
-
- SV-45212r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38608r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow drag and drop or copy and paste files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI038
- Vuln IDs
-
- V-6255
- Rule IDs
-
- SV-45265r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38661r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Launching applications and files in an IFRAME" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI039
- Vuln IDs
-
- V-6256
- Rule IDs
-
- SV-45280r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38676r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Navigate windows and frames across different domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI042
- Vuln IDs
-
- V-6259
- Rule IDs
-
- SV-45459r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38856r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Userdata persistence" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI044
- Vuln IDs
-
- V-6260
- Rule IDs
-
- SV-45122r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38519r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow cut, copy or paste operations from the clipboard via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI046
- Vuln IDs
-
- V-6262
- Rule IDs
-
- SV-45273r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38669r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Logon options" to "Enabled", and select "Prompt for user name and password" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI061
- Vuln IDs
-
- V-6267
- Rule IDs
-
- SV-45250r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38646r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> "Java permissions" to "Enabled", and select "High Safety" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI091
- Vuln IDs
-
- V-6281
- Rule IDs
-
- SV-45251r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38647r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> "Java permissions" to "Enabled", and select "High Safety" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI112
- Vuln IDs
-
- V-6289
- Rule IDs
-
- SV-45326r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38723r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download signed ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI113
- Vuln IDs
-
- V-6290
- Rule IDs
-
- SV-45330r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38727r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Download unsigned ActiveX controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI114
- Vuln IDs
-
- V-6291
- Rule IDs
-
- SV-45403r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38800r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Initialize and script ActiveX controls not marked as safe" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI115
- Vuln IDs
-
- V-6292
- Rule IDs
-
- SV-45072r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38479r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run ActiveX controls and plugins" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI116
- Vuln IDs
-
- V-6293
- Rule IDs
-
- SV-45074r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38481r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Script ActiveX controls marked safe for scripting" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI119
- Vuln IDs
-
- V-6294
- Rule IDs
-
- SV-45150r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38546r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI120
- Vuln IDs
-
- V-6295
- Rule IDs
-
- SV-45159r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38556r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow font downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI122
- Vuln IDs
-
- V-6297
- Rule IDs
-
- SV-45069r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38476r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Access data sources across domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI123
- Vuln IDs
-
- V-6298
- Rule IDs
-
- SV-45324r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38720r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow META REFRESH" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI126
- Vuln IDs
-
- V-6301
- Rule IDs
-
- SV-45213r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38609r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow drag and drop or copy and paste files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI127
- Vuln IDs
-
- V-6302
- Rule IDs
-
- SV-45216r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38612r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow installation of desktop items" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI128
- Vuln IDs
-
- V-6303
- Rule IDs
-
- SV-45267r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38663r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Launching applications and files in an IFRAME" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI129
- Vuln IDs
-
- V-6304
- Rule IDs
-
- SV-45281r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38677r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Navigate windows and frames across different domains" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI132
- Vuln IDs
-
- V-6307
- Rule IDs
-
- SV-45482r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38879r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Userdata persistence" to "Enabled", and select "Disable" from the drop-down box
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI133
- Vuln IDs
-
- V-6308
- Rule IDs
-
- SV-45071r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38478r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow active scripting" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI134
- Vuln IDs
-
- V-6309
- Rule IDs
-
- SV-45126r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38522r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow cut, copy or paste operations from the clipboard via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI136
- Vuln IDs
-
- V-6311
- Rule IDs
-
- SV-45271r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38667r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Logon options" to "Enabled", and select "Anonymous logon" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI121
- Vuln IDs
-
- V-7007
- Rule IDs
-
- SV-45263r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38659r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI697
- Vuln IDs
-
- V-14245
- Rule IDs
-
- SV-45057r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38466r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> "Do Not Allow users to enable or disable add-ons" to "Disabled" or "Not Configured".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI305
- Vuln IDs
-
- V-15490
- Rule IDs
-
- SV-45107r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38506r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable changing Automatic Configuration settings" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI315
- Vuln IDs
-
- V-15492
- Rule IDs
-
- SV-45282r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38678r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent participation in the Customer Experience Improvement Program" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI325
- Vuln IDs
-
- V-15494
- Rule IDs
-
- SV-45302r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38698r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off the Security Settings Check feature" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI340
- Vuln IDs
-
- V-15497
- Rule IDs
-
- SV-45070r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38477r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow active content from CDs to run on user machines" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI350
- Vuln IDs
-
- V-15499
- Rule IDs
-
- SV-45311r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38707r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow software to run or install even if the signature is invalid" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI355
- Vuln IDs
-
- V-15500
- Rule IDs
-
- SV-45445r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38842r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Allow third-party browser extensions" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI365
- Vuln IDs
-
- V-15502
- Rule IDs
-
- SV-45335r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38731r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for server certificate revocation" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI370
- Vuln IDs
-
- V-15503
- Rule IDs
-
- SV-45120r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38517r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> "Check for signatures on downloaded programs" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI375
- Vuln IDs
-
- V-15504
- Rule IDs
-
- SV-45079r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38486r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> "Intranet Sites: Include all network paths (UNCs)" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI385
- Vuln IDs
-
- V-15507
- Rule IDs
-
- SV-45296r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38692r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow script-initiated windows without size or position constraints" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI390
- Vuln IDs
-
- V-15508
- Rule IDs
-
- SV-45297r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38693r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow script-initiated windows without size or position constraints" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI395
- Vuln IDs
-
- V-15509
- Rule IDs
-
- SV-45299r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38695r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow Scriptlets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI415
- Vuln IDs
-
- V-15513
- Rule IDs
-
- SV-45108r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38507r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Automatic prompting for file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI425
- Vuln IDs
-
- V-15515
- Rule IDs
-
- SV-45252r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38648r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> "Java permissions" to "Enabled", and "Disable Java" selected from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI430
- Vuln IDs
-
- V-15516
- Rule IDs
-
- SV-45255r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38651r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI435
- Vuln IDs
-
- V-15517
- Rule IDs
-
- SV-45254r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38650r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI440
- Vuln IDs
-
- V-15518
- Rule IDs
-
- SV-45261r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38657r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI445
- Vuln IDs
-
- V-15519
- Rule IDs
-
- SV-45253r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38649r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Internet Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI450
- Vuln IDs
-
- V-15520
- Rule IDs
-
- SV-45257r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38653r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> "Java permissions" to "Enabled", and select "Disable Java" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI455
- Vuln IDs
-
- V-15521
- Rule IDs
-
- SV-45493r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38891r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow loading of XAML files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI460
- Vuln IDs
-
- V-15522
- Rule IDs
-
- SV-45497r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38894r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow loading of XAML files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI465
- Vuln IDs
-
- V-15523
- Rule IDs
-
- SV-45276r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38672r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Enable MIME Sniffing" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI470
- Vuln IDs
-
- V-15524
- Rule IDs
-
- SV-45278r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38674r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Enable MIME Sniffing" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI475
- Vuln IDs
-
- V-15525
- Rule IDs
-
- SV-45155r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38551r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn off first-run prompt" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI480
- Vuln IDs
-
- V-15526
- Rule IDs
-
- SV-45157r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38553r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn off first-run prompt" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI485
- Vuln IDs
-
- V-15527
- Rule IDs
-
- SV-45288r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38684r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Protected Mode" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI490
- Vuln IDs
-
- V-15528
- Rule IDs
-
- SV-45290r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38686r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Protected Mode" to "Enabled" and select "Enable", from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI495
- Vuln IDs
-
- V-15529
- Rule IDs
-
- SV-45283r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38679r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Use Pop-up Blocker" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI500
- Vuln IDs
-
- V-15530
- Rule IDs
-
- SV-45284r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38680r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Use Pop-up Blocker" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI515
- Vuln IDs
-
- V-15533
- Rule IDs
-
- SV-45486r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38883r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Web sites in less privileged Web content zones can navigate into this zone" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI520
- Vuln IDs
-
- V-15534
- Rule IDs
-
- SV-45489r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38886r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Web sites in less privileged Web content zones can navigate into this zone" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI575
- Vuln IDs
-
- V-15545
- Rule IDs
-
- SV-45098r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38498r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow binary and script behaviors" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI580
- Vuln IDs
-
- V-15546
- Rule IDs
-
- SV-45111r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38508r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Automatic prompting for file downloads" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI590
- Vuln IDs
-
- V-15548
- Rule IDs
-
- SV-45224r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38620r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI595
- Vuln IDs
-
- V-15549
- Rule IDs
-
- SV-45227r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38623r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI600
- Vuln IDs
-
- V-15550
- Rule IDs
-
- SV-45228r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38624r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI605
- Vuln IDs
-
- V-15551
- Rule IDs
-
- SV-45229r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38625r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI610
- Vuln IDs
-
- V-15552
- Rule IDs
-
- SV-45244r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38640r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI630
- Vuln IDs
-
- V-15556
- Rule IDs
-
- SV-45236r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38632r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI635
- Vuln IDs
-
- V-15557
- Rule IDs
-
- SV-45234r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38630r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI640
- Vuln IDs
-
- V-15558
- Rule IDs
-
- SV-45235r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38631r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI645
- Vuln IDs
-
- V-15559
- Rule IDs
-
- SV-45241r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38637r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI650
- Vuln IDs
-
- V-15560
- Rule IDs
-
- SV-45049r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38461r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components not signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI655
- Vuln IDs
-
- V-15561
- Rule IDs
-
- SV-45054r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38464r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Run .NET Framework-reliant components signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI670
- Vuln IDs
-
- V-15562
- Rule IDs
-
- SV-45294r2_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38690r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Scripting of Java applets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI675
- Vuln IDs
-
- V-15563
- Rule IDs
-
- SV-45439r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38836r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent changing the URL for checking updates to Internet Explorer and Internet Tools" to "Enabled" with a "blank or empty" selection box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI680
- Vuln IDs
-
- V-15564
- Rule IDs
-
- SV-45435r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38832r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Settings -> Component Updates -> Periodic check for updates to Internet Explorer and Internet Tools -> "Prevent specifying the update check interval (in days)" to "Enabled", and select "30" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI592
- Vuln IDs
-
- V-15565
- Rule IDs
-
- SV-45222r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38618r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI594
- Vuln IDs
-
- V-15566
- Rule IDs
-
- SV-45223r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38619r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI599
- Vuln IDs
-
- V-15568
- Rule IDs
-
- SV-45230r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38626r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI612
- Vuln IDs
-
- V-15569
- Rule IDs
-
- SV-45242r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38638r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI614
- Vuln IDs
-
- V-15570
- Rule IDs
-
- SV-45243r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38639r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI647
- Vuln IDs
-
- V-15571
- Rule IDs
-
- SV-45237r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38633r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI649
- Vuln IDs
-
- V-15572
- Rule IDs
-
- SV-45240r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38636r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI690
- Vuln IDs
-
- V-15574
- Rule IDs
-
- SV-45099r1_rule
Checks: C-42457r1_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable AutoComplete for forms" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value Use FormSuggest is REG_SZ = no, this is not a finding.
Fix: F-38499r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Disable AutoComplete for forms" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI715
- Vuln IDs
-
- V-15579
- Rule IDs
-
- SV-45130r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38526r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Crash Detection" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI725
- Vuln IDs
-
- V-15581
- Rule IDs
-
- SV-45101r1_rule
Checks: C-42458r1_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on the auto-complete feature for user names and passwords on forms" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value FormSuggest Passwords is REG_SZ = no, this is not a finding. AND Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value FormSuggest PW Ask is REG_SZ = no, this is not a finding.
Fix: F-38500r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on the auto-complete feature for user names and passwords on forms" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI596
- Vuln IDs
-
- V-15603
- Rule IDs
-
- SV-45225r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38621r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI597
- Vuln IDs
-
- V-15604
- Rule IDs
-
- SV-45226r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38622r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI010
- Vuln IDs
-
- V-17296
- Rule IDs
-
- SV-45152r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38548r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Prevent running First Run Wizard" to "Enabled", and select "Go directly to home page" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI300
- Vuln IDs
-
- V-21887
- Rule IDs
-
- SV-45128r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38525r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Disable Configuring History" to "Enabled", and enter "40" in 'Days to keep pages in History'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI740
- Vuln IDs
-
- V-22108
- Rule IDs
-
- SV-45275r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38671r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> " Prevent Managing SmartScreen Filter" to "Enabled", and select "Off" from the drop-down box.
- RMF Control
- Severity
- L
- CCI
- Version
- DTBI750
- Vuln IDs
-
- V-22147
- Rule IDs
-
- SV-45449r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38846r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Compatibility View -> "Include updated Web site lists from Microsoft" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI760
- Vuln IDs
-
- V-22148
- Rule IDs
-
- SV-45115r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38511r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Allow deleting browsing history on exit" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI770
- Vuln IDs
-
- V-22149
- Rule IDs
-
- SV-45137r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38534r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> "Prevent Deleting Web sites that the User has Visited" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI780
- Vuln IDs
-
- V-22150
- Rule IDs
-
- SV-45214r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38610r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Privacy -> "Turn off InPrivate Browsing" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI800
- Vuln IDs
-
- V-22152
- Rule IDs
-
- SV-45293r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38689r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow scripting of Internet Explorer WebBrowser controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI810
- Vuln IDs
-
- V-22153
- Rule IDs
-
- SV-45490r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38887r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Include local path when user is uploading files to a server" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI820
- Vuln IDs
-
- V-22154
- Rule IDs
-
- SV-45306r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38702r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Show security warning for potentially unsafe files" to "Enabled", and select "Prompt" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI830
- Vuln IDs
-
- V-22155
- Rule IDs
-
- SV-45075r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38482r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Allow only approved domains to use ActiveX controls without prompt" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI840
- Vuln IDs
-
- V-22156
- Rule IDs
-
- SV-45131r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38528r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> "Turn on Cross-Site Scripting (XSS) Filter" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI850
- Vuln IDs
-
- V-22157
- Rule IDs
-
- SV-45291r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38687r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow scripting of Internet Explorer WebBrowser controls" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI860
- Vuln IDs
-
- V-22158
- Rule IDs
-
- SV-45491r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38889r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Include local path when user is uploading files to a server" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI870
- Vuln IDs
-
- V-22159
- Rule IDs
-
- SV-45309r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38706r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Show security warning for potentially unsafe files" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI880
- Vuln IDs
-
- V-22160
- Rule IDs
-
- SV-45076r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38483r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Allow only approved domains to use ActiveX controls without prompt" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI890
- Vuln IDs
-
- V-22161
- Rule IDs
-
- SV-45133r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38529r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> "Turn on Cross-Site Scripting (XSS) Filter" to "Enabled", and select "Enable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI900
- Vuln IDs
-
- V-22171
- Rule IDs
-
- SV-45249r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38645r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI910
- Vuln IDs
-
- V-22634
- Rule IDs
-
- SV-45314r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38710r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Allow updates to status bar via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI920
- Vuln IDs
-
- V-22635
- Rule IDs
-
- SV-45047r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38460r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components not signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI930
- Vuln IDs
-
- V-22636
- Rule IDs
-
- SV-45053r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38463r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone "Run .NET Framework-reliant components signed with Authenticode" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI940
- Vuln IDs
-
- V-22637
- Rule IDs
-
- SV-45301r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38697r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow Scriptlets" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI950
- Vuln IDs
-
- V-22638
- Rule IDs
-
- SV-45318r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38714r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone "Allow updates to status bar via script" to "Enabled", and select "Disable" from the drop-down box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1010
- Vuln IDs
-
- V-22687
- Rule IDs
-
- SV-45475r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38872r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1020
- Vuln IDs
-
- V-22688
- Rule IDs
-
- SV-45473r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38870r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI745
- Vuln IDs
-
- V-30774
- Rule IDs
-
- SV-45078r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38485r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off add-on performance notifications" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI755
- Vuln IDs
-
- V-30775
- Rule IDs
-
- SV-45112r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38509r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off Browser Geolocation" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI765
- Vuln IDs
-
- V-30776
- Rule IDs
-
- SV-45321r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38717r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn on Suggested Sites" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI775
- Vuln IDs
-
- V-30777
- Rule IDs
-
- SV-45103r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38502r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel-> Advanced Page-> "Automatically check for Internet Explorer updates" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI805
- Vuln IDs
-
- V-30778
- Rule IDs
-
- SV-45077r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38484r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> "Turn off ActiveX opt-in prompt" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI815
- Vuln IDs
-
- V-30779
- Rule IDs
-
- SV-45233r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38629r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI825
- Vuln IDs
-
- V-30780
- Rule IDs
-
- SV-45231r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38627r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI835
- Vuln IDs
-
- V-30781
- Rule IDs
-
- SV-45232r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38628r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> "Internet Explorer Processes" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI018
- Vuln IDs
-
- V-32808
- Rule IDs
-
- SV-45116r2_rule
Checks: C-42471r2_chk
Open Internet Explorer. From the menu bar select Tools. From the Tools drop-down menu, select Internet Options. From the Internet Options window, select the "Advanced" tab from the Advanced tab window, scroll down to the Security category, and verify the "Check for publisher's certificate revocation" box is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Criteria: If the value State is REG_DWORD = 65536 (decimal), this is not a finding.
Fix: F-38512r4_fix
In the Internet Explorer Options, on the "Advanced" tab, scroll down to Security category, and select the "Check for publisher's certificate revocation" box. NOTE: Manual entry for the value State, set to REG_DWORD = 65536, may first be required.
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1040
- Vuln IDs
-
- V-34414
- Rule IDs
-
- SV-45046r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38459r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Always send Do Not Track header" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI980
- Vuln IDs
-
- V-34425
- Rule IDs
-
- SV-45063r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38471r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer "Install new versions of Internet Explorer automatically" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1035
- Vuln IDs
-
- V-34456
- Rule IDs
-
- SV-45140r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38536r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Security Features "Do not display the reveal password button" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI990
- Vuln IDs
-
- V-34457
- Rule IDs
-
- SV-45142r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38538r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains across windows" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1005
- Vuln IDs
-
- V-34458
- Rule IDs
-
- SV-45143r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38539r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains across windows" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1000
- Vuln IDs
-
- V-34459
- Rule IDs
-
- SV-45144r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38540r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Enable dragging of content from different domains within a window" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1025
- Vuln IDs
-
- V-34460
- Rule IDs
-
- SV-45146r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38542r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Enable dragging of content from different domains within a window" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI995
- Vuln IDs
-
- V-34461
- Rule IDs
-
- SV-45147r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38543r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Turn on Enhanced Protected Mode" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1055
- Vuln IDs
-
- V-34474
- Rule IDs
-
- SV-45217r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38613r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Accelerators "Turn off Accelerators" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1045
- Vuln IDs
-
- V-34489
- Rule IDs
-
- SV-45269r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38665r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone "Render Legacy Filters" to "Enabled", and select "Disable".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1050
- Vuln IDs
-
- V-34490
- Rule IDs
-
- SV-45270r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38666r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone "Render Legacy Filters" to "Enabled", and select "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI1030
- Vuln IDs
-
- V-34590
- Rule IDs
-
- SV-45454r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38851r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Settings-> AutoComplete "Turn off URL Suggestions" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTBI985
- Vuln IDs
-
- V-34610
- Rule IDs
-
- SV-45478r1_rule
Checks: http://oval.mitre.org/XMLSchema/oval-definitions-5
Fix: F-38875r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page "Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled" to "Enabled".