Microsoft Internet Explorer 11 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +137 −137
Comparison against the immediately-prior release (V1R19). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 137
- V-223015 Medium The Internet Explorer warning about certificate address mismatch must be enforced.
- V-223016 Low Check for publishers certificate revocation must be enforced.
- V-223017 Medium The Download signed ActiveX controls property must be disallowed (Internet zone).
- V-223018 Medium The Download unsigned ActiveX controls property must be disallowed (Internet zone).
- V-223019 Medium The Initialize and script ActiveX controls not marked as safe property must be disallowed (Internet zone).
- V-223020 Medium The Java permissions must be disallowed (Internet zone).
- V-223021 Medium Accessing data sources across domains must be disallowed (Internet zone).
- V-223022 Medium Functionality to drag and drop or copy and paste files must be disallowed (Internet zone).
- V-223023 Medium Launching programs and files in IFRAME must be disallowed (Internet zone).
- V-223024 Medium Navigating windows and frames across different domains must be disallowed (Internet zone).
- V-223025 Medium Userdata persistence must be disallowed (Internet zone).
- V-223026 Medium Clipboard operations via script must be disallowed (Internet zone).
- V-223027 Medium Logon options must be configured to prompt (Internet zone).
- V-223028 Medium Java permissions must be configured with High Safety (Intranet zone).
- V-223029 Medium Anti-Malware programs against ActiveX controls must be run for the Intranet zone.
- V-223030 Medium Java permissions must be configured with High Safety (Trusted Sites zone).
- V-223031 Medium Anti-Malware programs against ActiveX controls must be run for the Trusted Sites zone.
- V-223032 Medium Dragging of content from different domains within a window must be disallowed (Internet zone).
- V-223033 Medium Dragging of content from different domains across windows must be disallowed (Restricted Sites zone).
- V-223034 Medium Internet Explorer Processes Restrict ActiveX Install must be enforced (Explorer).
- V-223035 Medium Internet Explorer Processes Restrict ActiveX Install must be enforced (iexplore).
- V-223036 Medium Dragging of content from different domains within a window must be disallowed (Restricted Sites zone).
- V-223037 Medium Anti-Malware programs against ActiveX controls must be run for the Internet zone.
- V-223038 Medium Anti-Malware programs against ActiveX controls must be run for the Restricted Sites zone.
- V-223039 Medium Prevent bypassing SmartScreen Filter warnings must be enabled.
- V-223040 Medium Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the internet must be enabled.
- V-223041 Medium Prevent per-user installation of ActiveX controls must be enabled.
- V-223042 Medium Prevent ignoring certificate errors option must be enabled.
- V-223043 Medium Turn on SmartScreen Filter scan option for the Internet Zone must be enabled.
- V-223044 Medium Turn on SmartScreen Filter scan option for the Restricted Sites Zone must be enabled.
- V-223045 Medium The Initialize and script ActiveX controls not marked as safe must be disallowed (Intranet Zone).
- V-223046 Medium The Initialize and script ActiveX controls not marked as safe must be disallowed (Trusted Sites Zone).
- V-223048 Medium Run once selection for running outdated ActiveX controls must be disabled.
- V-223049 Medium Enabling outdated ActiveX controls for Internet Explorer must be blocked.
- V-223050 Medium Use of the Tabular Data Control (TDC) ActiveX control must be disabled for the Internet Zone.
- V-223051 Medium The Download signed ActiveX controls property must be disallowed (Restricted Sites zone).
- V-223052 Medium Use of the Tabular Data Control (TDC) ActiveX control must be disabled for the Restricted Sites Zone.
- V-223053 Medium VBScript must not be allowed to run in Internet Explorer (Internet zone).
- V-223054 Medium The Download unsigned ActiveX controls property must be disallowed (Restricted Sites zone).
- V-223055 Medium VBScript must not be allowed to run in Internet Explorer (Restricted Sites zone).
- V-223056 Low Internet Explorer Development Tools Must Be Disabled.
- V-223057 Medium The Initialize and script ActiveX controls not marked as safe property must be disallowed (Restricted Sites zone).
- V-223058 Medium ActiveX controls and plug-ins must be disallowed (Restricted Sites zone).
- V-223059 Medium ActiveX controls marked safe for scripting must be disallowed (Restricted Sites zone).
- V-223060 Medium File downloads must be disallowed (Restricted Sites zone).
- V-223061 Medium Java permissions must be disallowed (Restricted Sites zone).
- V-223062 Medium Accessing data sources across domains must be disallowed (Restricted Sites zone).
- V-223063 Medium The Allow META REFRESH property must be disallowed (Restricted Sites zone).
- V-223064 Medium Functionality to drag and drop or copy and paste files must be disallowed (Restricted Sites zone).
- V-223065 Medium Launching programs and files in IFRAME must be disallowed (Restricted Sites zone).
- V-223066 Medium Navigating windows and frames across different domains must be disallowed (Restricted Sites zone).
- V-223067 Medium Userdata persistence must be disallowed (Restricted Sites zone).
- V-223068 Medium Active scripting must be disallowed (Restricted Sites Zone).
- V-223069 Medium Clipboard operations via script must be disallowed (Restricted Sites zone).
- V-223070 Medium Logon options must be configured and enforced (Restricted Sites zone).
- V-223071 Medium Configuring History setting must be set to 40 days.
- V-223072 Medium Internet Explorer must be set to disallow users to add/delete sites.
- V-223073 Medium Internet Explorer must be configured to disallow users to change policies.
- V-223074 Medium Internet Explorer must be configured to use machine settings.
- V-223075 Medium Security checking features must be enforced.
- V-223076 Medium Software must be disallowed to run or install with invalid signatures.
- V-223077 Medium The 64-bit tab processes, when running in Enhanced Protected Mode on 64-bit versions of Windows, must be turned on.
- V-223078 Low Checking for server certificate revocation must be enforced.
- V-223079 Medium Checking for signatures on downloaded programs must be enforced.
- V-223080 Medium All network paths (UNCs) for Intranet sites must be disallowed.
- V-223081 Medium Script-initiated windows without size or position constraints must be disallowed (Internet zone).
- V-223082 Medium Script-initiated windows without size or position constraints must be disallowed (Restricted Sites zone).
- V-223083 Medium Scriptlets must be disallowed (Internet zone).
- V-223084 Medium Automatic prompting for file downloads must be disallowed (Internet zone).
- V-223085 Medium Java permissions must be disallowed (Local Machine zone).
- V-223086 Medium Anti-Malware programs against ActiveX controls must be run for the Local Machine zone.
- V-223087 Medium Java permissions must be disallowed (Locked Down Local Machine zone).
- V-223088 Medium Java permissions must be disallowed (Locked Down Intranet zone).
- V-223089 Medium Java permissions must be disallowed (Locked Down Trusted Sites zone).
- V-223090 Medium Java permissions must be disallowed (Locked Down Restricted Sites zone).
- V-223091 Medium XAML files must be disallowed (Internet zone).
- V-223092 Medium XAML files must be disallowed (Restricted Sites zone).
- V-223093 Medium Protected Mode must be enforced (Internet zone).
- V-223094 Medium Protected Mode must be enforced (Restricted Sites zone).
- V-223095 Medium Pop-up Blocker must be enforced (Internet zone).
- V-223096 Medium Pop-up Blocker must be enforced (Restricted Sites zone).
- V-223097 Medium Websites in less privileged web content zones must be prevented from navigating into the Internet zone.
- V-223098 Medium Websites in less privileged web content zones must be prevented from navigating into the Restricted Sites zone.
- V-223099 Medium Allow binary and script behaviors must be disallowed (Restricted Sites zone).
- V-223100 Medium Automatic prompting for file downloads must be disallowed (Restricted Sites zone).
- V-223101 Medium Internet Explorer Processes for MIME handling must be enforced. (Reserved)
- V-223102 Medium Internet Explorer Processes for MIME handling must be enforced (Explorer).
- V-223103 Medium Internet Explorer Processes for MIME handling must be enforced (iexplore).
- V-223104 Medium Internet Explorer Processes for MIME sniffing must be enforced (Reserved).
- V-223105 Medium Internet Explorer Processes for MIME sniffing must be enforced (Explorer).
- V-223106 Medium Internet Explorer Processes for MIME sniffing must be enforced (iexplore).
- V-223107 Medium Internet Explorer Processes for MK protocol must be enforced (Reserved).
- V-223108 Medium Internet Explorer Processes for MK protocol must be enforced (Explorer).
- V-223109 Medium Internet Explorer Processes for MK protocol must be enforced (iexplore).
- V-223110 Medium Internet Explorer Processes for Zone Elevation must be enforced (Reserved).
- V-223111 Medium Internet Explorer Processes for Zone Elevation must be enforced (Explorer).
- V-223112 Medium Internet Explorer Processes for Zone Elevation must be enforced (iexplore).
- V-223113 Medium Internet Explorer Processes for Restrict File Download must be enforced (Reserved).
- V-223114 Medium Internet Explorer Processes for Restrict File Download must be enforced (Explorer).
- V-223115 Medium Internet Explorer Processes for Restrict File Download must be enforced (iexplore).
- V-223116 Medium Internet Explorer Processes for restricting pop-up windows must be enforced (Reserved).
- V-223117 Medium Internet Explorer Processes for restricting pop-up windows must be enforced (Explorer).
- V-223118 Medium Internet Explorer Processes for restricting pop-up windows must be enforced (iexplore).
- V-223119 Medium .NET Framework-reliant components not signed with Authenticode must be disallowed to run (Restricted Sites Zone).
- V-223120 Medium .NET Framework-reliant components signed with Authenticode must be disallowed to run (Restricted Sites Zone).
- V-223121 Medium Scripting of Java applets must be disallowed (Restricted Sites zone).
- V-223122 Medium AutoComplete feature for forms must be disallowed.
- V-223123 Medium Crash Detection management must be enforced.
- V-223124 Medium Turn on the auto-complete feature for user names and passwords on forms must be disabled.
- V-223125 Medium Managing SmartScreen Filter use must be enforced.
- V-223126 Medium Browser must retain history on exit.
- V-223127 Medium Deleting websites that the user has visited must be disallowed.
- V-223128 Medium InPrivate Browsing must be disallowed.
- V-223129 Medium Scripting of Internet Explorer WebBrowser control property must be disallowed (Internet zone).
- V-223130 Medium When uploading files to a server, the local directory path must be excluded (Internet zone).
- V-223131 Medium Internet Explorer Processes for Notification Bars must be enforced (Reserved).
- V-223132 Medium Security Warning for unsafe files must be set to prompt (Internet zone).
- V-223133 Medium Internet Explorer Processes for Notification Bars must be enforced (Explorer).
- V-223134 Medium ActiveX controls without prompt property must be used in approved domains only (Internet zone).
- V-223135 Medium Internet Explorer Processes for Notification Bars must be enforced (iexplore).
- V-223136 Medium Cross-Site Scripting Filter must be enforced (Internet zone).
- V-223137 Medium Scripting of Internet Explorer WebBrowser Control must be disallowed (Restricted Sites zone).
- V-223138 Medium When uploading files to a server, the local directory path must be excluded (Restricted Sites zone).
- V-223139 Medium Security Warning for unsafe files must be disallowed (Restricted Sites zone).
- V-223140 Medium ActiveX controls without prompt property must be used in approved domains only (Restricted Sites zone).
- V-223141 Medium Cross-Site Scripting Filter property must be enforced (Restricted Sites zone).
- V-223142 Medium Internet Explorer Processes Restrict ActiveX Install must be enforced (Reserved).
- V-223143 Medium Status bar updates via script must be disallowed (Internet zone).
- V-223144 Medium .NET Framework-reliant components not signed with Authenticode must be disallowed to run (Internet zone).
- V-223145 Medium .NET Framework-reliant components signed with Authenticode must be disallowed to run (Internet zone).
- V-223146 Medium Scriptlets must be disallowed (Restricted Sites zone).
- V-223147 Medium Status bar updates via script must be disallowed (Restricted Sites zone).
- V-223148 Medium When Enhanced Protected Mode is enabled, ActiveX controls must be disallowed to run in Protected Mode.
- V-223149 Medium Dragging of content from different domains across windows must be disallowed (Internet zone).
- V-223150 Medium Enhanced Protected Mode functionality must be enforced.
- V-250540 Medium Turn off Encryption Support must be enabled.
- V-250541 Medium Allow Fallback to SSL 3.0 (Internet Explorer) must be disabled.
Removed rules 137
- V-46473 Medium Turn off Encryption Support must be enabled.
- V-46475 Medium The Internet Explorer warning about certificate address mismatch must be enforced.
- V-46477 Low Check for publishers certificate revocation must be enforced.
- V-46481 Medium The Download signed ActiveX controls property must be disallowed (Internet zone).
- V-46483 Medium The Download unsigned ActiveX controls property must be disallowed (Internet zone).
- V-46501 Medium The Initialize and script ActiveX controls not marked as safe property must be disallowed (Internet zone).
- V-46507 Medium The Java permissions must be disallowed (Internet zone).
- V-46509 Medium Accessing data sources across domains must be disallowed (Internet zone).
- V-46511 Medium Functionality to drag and drop or copy and paste files must be disallowed (Internet zone).
- V-46513 Medium Launching programs and files in IFRAME must be disallowed (Internet zone).
- V-46515 Medium Navigating windows and frames across different domains must be disallowed (Internet zone).
- V-46517 Medium Userdata persistence must be disallowed (Internet zone).
- V-46521 Medium Clipboard operations via script must be disallowed (Internet zone).
- V-46523 Medium Logon options must be configured to prompt (Internet zone).
- V-46525 Medium Java permissions must be configured with High Safety (Intranet zone).
- V-46543 Medium Java permissions must be configured with High Safety (Trusted Sites zone).
- V-46545 Medium Dragging of content from different domains within a window must be disallowed (Internet zone).
- V-46547 Medium Dragging of content from different domains across windows must be disallowed (Restricted Sites zone).
- V-46549 Medium Internet Explorer Processes Restrict ActiveX Install must be enforced (Explorer).
- V-46553 Medium Internet Explorer Processes Restrict ActiveX Install must be enforced (iexplore).
- V-46555 Medium Dragging of content from different domains within a window must be disallowed (Restricted Sites zone).
- V-46573 Medium The Download signed ActiveX controls property must be disallowed (Restricted Sites zone).
- V-46575 Medium The Download unsigned ActiveX controls property must be disallowed (Restricted Sites zone).
- V-46577 Medium The Initialize and script ActiveX controls not marked as safe property must be disallowed (Restricted Sites zone).
- V-46579 Medium ActiveX controls and plug-ins must be disallowed (Restricted Sites zone).
- V-46581 Medium ActiveX controls marked safe for scripting must be disallowed (Restricted Sites zone).
- V-46583 Medium File downloads must be disallowed (Restricted Sites zone).
- V-46587 Medium Java permissions must be disallowed (Restricted Sites zone).
- V-46589 Medium Accessing data sources across domains must be disallowed (Restricted Sites zone).
- V-46591 Medium The Allow META REFRESH property must be disallowed (Restricted Sites zone).
- V-46593 Medium Functionality to drag and drop or copy and paste files must be disallowed (Restricted Sites zone).
- V-46597 Medium Launching programs and files in IFRAME must be disallowed (Restricted Sites zone).
- V-46599 Medium Navigating windows and frames across different domains must be disallowed (Restricted Sites zone).
- V-46601 Medium Userdata persistence must be disallowed (Restricted Sites zone).
- V-46603 Medium Active scripting must be disallowed (Restricted Sites Zone).
- V-46605 Medium Clipboard operations via script must be disallowed (Restricted Sites zone).
- V-46607 Medium Logon options must be configured and enforced (Restricted Sites zone).
- V-46609 Medium Configuring History setting must be set to 40 days.
- V-46615 Medium Internet Explorer must be set to disallow users to add/delete sites.
- V-46617 Medium Internet Explorer must be configured to disallow users to change policies.
- V-46619 Medium Internet Explorer must be configured to use machine settings.
- V-46621 Medium Security checking features must be enforced.
- V-46625 Medium Software must be disallowed to run or install with invalid signatures.
- V-46629 Low Checking for server certificate revocation must be enforced.
- V-46633 Medium Checking for signatures on downloaded programs must be enforced.
- V-46635 Medium All network paths (UNCs) for Intranet sites must be disallowed.
- V-46637 Medium Script-initiated windows without size or position constraints must be disallowed (Internet zone).
- V-46639 Medium Script-initiated windows without size or position constraints must be disallowed (Restricted Sites zone).
- V-46641 Medium Scriptlets must be disallowed (Internet zone).
- V-46643 Medium Automatic prompting for file downloads must be disallowed (Internet zone).
- V-46645 Medium Java permissions must be disallowed (Local Machine zone).
- V-46647 Medium Java permissions must be disallowed (Locked Down Local Machine zone).
- V-46649 Medium Java permissions must be disallowed (Locked Down Intranet zone).
- V-46653 Medium Java permissions must be disallowed (Locked Down Trusted Sites zone).
- V-46663 Medium Java permissions must be disallowed (Locked Down Restricted Sites zone).
- V-46665 Medium XAML files must be disallowed (Internet zone).
- V-46669 Medium XAML files must be disallowed (Restricted Sites zone).
- V-46681 Medium Protected Mode must be enforced (Internet zone).
- V-46685 Medium Protected Mode must be enforced (Restricted Sites zone).
- V-46689 Medium Pop-up Blocker must be enforced (Internet zone).
- V-46691 Medium Pop-up Blocker must be enforced (Restricted Sites zone).
- V-46693 Medium Websites in less privileged web content zones must be prevented from navigating into the Internet zone.
- V-46695 Medium Websites in less privileged web content zones must be prevented from navigating into the Restricted Sites zone.
- V-46701 Medium Allow binary and script behaviors must be disallowed (Restricted Sites zone).
- V-46705 Medium Automatic prompting for file downloads must be disallowed (Restricted Sites zone).
- V-46709 Medium Internet Explorer Processes for MIME handling must be enforced. (Reserved)
- V-46711 Medium Internet Explorer Processes for MIME handling must be enforced (Explorer).
- V-46713 Medium Internet Explorer Processes for MIME handling must be enforced (iexplore).
- V-46715 Medium Internet Explorer Processes for MIME sniffing must be enforced (Reserved).
- V-46717 Medium Internet Explorer Processes for MIME sniffing must be enforced (Explorer).
- V-46719 Medium Internet Explorer Processes for MIME sniffing must be enforced (iexplore).
- V-46721 Medium Internet Explorer Processes for MK protocol must be enforced (Reserved).
- V-46723 Medium Internet Explorer Processes for MK protocol must be enforced (Explorer).
- V-46725 Medium Internet Explorer Processes for MK protocol must be enforced (iexplore).
- V-46727 Medium Internet Explorer Processes for Zone Elevation must be enforced (Reserved).
- V-46729 Medium Internet Explorer Processes for Zone Elevation must be enforced (Explorer).
- V-46731 Medium Internet Explorer Processes for Zone Elevation must be enforced (iexplore).
- V-46733 Medium Internet Explorer Processes for Restrict File Download must be enforced (Reserved).
- V-46779 Medium Internet Explorer Processes for Restrict File Download must be enforced (Explorer).
- V-46781 Medium Internet Explorer Processes for Restrict File Download must be enforced (iexplore).
- V-46787 Medium Internet Explorer Processes for restricting pop-up windows must be enforced (Reserved).
- V-46789 Medium Internet Explorer Processes for restricting pop-up windows must be enforced (Explorer).
- V-46791 Medium Internet Explorer Processes for restricting pop-up windows must be enforced (iexplore).
- V-46797 Medium .NET Framework-reliant components not signed with Authenticode must be disallowed to run (Restricted Sites Zone).
- V-46799 Medium .NET Framework-reliant components signed with Authenticode must be disallowed to run (Restricted Sites Zone).
- V-46801 Medium Scripting of Java applets must be disallowed (Restricted Sites zone).
- V-46807 Medium AutoComplete feature for forms must be disallowed.
- V-46811 Medium Crash Detection management must be enforced.
- V-46815 Medium Turn on the auto-complete feature for user names and passwords on forms must be disabled.
- V-46819 Medium Managing SmartScreen Filter use must be enforced.
- V-46829 Medium Browser must retain history on exit.
- V-46841 Medium Deleting websites that the user has visited must be disallowed.
- V-46847 Medium InPrivate Browsing must be disallowed.
- V-46849 Medium Scripting of Internet Explorer WebBrowser control property must be disallowed (Internet zone).
- V-46853 Medium When uploading files to a server, the local directory path must be excluded (Internet zone).
- V-46857 Medium Internet Explorer Processes for Notification Bars must be enforced (Reserved).
- V-46859 Medium Security Warning for unsafe files must be set to prompt (Internet zone).
- V-46861 Medium Internet Explorer Processes for Notification Bars must be enforced (Explorer).
- V-46865 Medium ActiveX controls without prompt property must be used in approved domains only (Internet zone).
- V-46869 Medium Internet Explorer Processes for Notification Bars must be enforced (iexplore).
- V-46879 Medium Cross-Site Scripting Filter must be enforced (Internet zone).
- V-46883 Medium Scripting of Internet Explorer WebBrowser Control must be disallowed (Restricted Sites zone).
- V-46885 Medium When uploading files to a server, the local directory path must be excluded (Restricted Sites zone).
- V-46889 Medium Security Warning for unsafe files must be disallowed (Restricted Sites zone).
- V-46893 Medium ActiveX controls without prompt property must be used in approved domains only (Restricted Sites zone).
- V-46895 Medium Cross-Site Scripting Filter property must be enforced (Restricted Sites zone).
- V-46897 Medium Internet Explorer Processes Restrict ActiveX Install must be enforced (Reserved).
- V-46903 Medium Status bar updates via script must be disallowed (Internet zone).
- V-46907 Medium .NET Framework-reliant components not signed with Authenticode must be disallowed to run (Internet zone).
- V-46921 Medium .NET Framework-reliant components signed with Authenticode must be disallowed to run (Internet zone).
- V-46927 Medium Scriptlets must be disallowed (Restricted Sites zone).
- V-46939 Medium Status bar updates via script must be disallowed (Restricted Sites zone).
- V-46975 Medium When Enhanced Protected Mode is enabled, ActiveX controls must be disallowed to run in Protected Mode.
- V-46981 Medium Dragging of content from different domains across windows must be disallowed (Internet zone).
- V-46987 Medium Enhanced Protected Mode functionality must be enforced.
- V-46995 Medium The 64-bit tab processes, when running in Enhanced Protected Mode on 64-bit versions of Windows, must be turned on.
- V-46997 Medium Anti-Malware programs against ActiveX controls must be run for the Internet zone.
- V-46999 Medium Anti-Malware programs against ActiveX controls must be run for the Intranet zone.
- V-47003 Medium Anti-Malware programs against ActiveX controls must be run for the Local Machine zone.
- V-47005 Medium Anti-Malware programs against ActiveX controls must be run for the Restricted Sites zone.
- V-47009 Medium Anti-Malware programs against ActiveX controls must be run for the Trusted Sites zone.
- V-64711 Medium Prevent bypassing SmartScreen Filter warnings must be enabled.
- V-64713 Medium Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the internet must be enabled.
- V-64715 Medium Prevent per-user installation of ActiveX controls must be enabled.
- V-64717 Medium Prevent ignoring certificate errors option must be enabled.
- V-64719 Medium Turn on SmartScreen Filter scan option for the Internet Zone must be enabled.
- V-64721 Medium Turn on SmartScreen Filter scan option for the Restricted Sites Zone must be enabled.
- V-64723 Medium The Initialize and script ActiveX controls not marked as safe must be disallowed (Intranet Zone).
- V-64725 Medium The Initialize and script ActiveX controls not marked as safe must be disallowed (Trusted Sites Zone).
- V-64729 Medium Allow Fallback to SSL 3.0 (Internet Explorer) must be disabled.
- V-72757 Medium Run once selection for running outdated ActiveX controls must be disabled.
- V-72759 Medium Enabling outdated ActiveX controls for Internet Explorer must be blocked.
- V-72761 Medium Use of the Tabular Data Control (TDC) ActiveX control must be disabled for the Internet Zone.
- V-72763 Medium Use of the Tabular Data Control (TDC) ActiveX control must be disabled for the Restricted Sites Zone.
- V-75169 Medium VBScript must not be allowed to run in Internet Explorer (Internet zone).
- V-75171 Medium VBScript must not be allowed to run in Internet Explorer (Restricted Sites zone).
- V-97527 Low Internet Explorer Development Tools Must Be Disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI015-IE11
- Vuln IDs
-
- V-223015
- V-46475
- Rule IDs
-
- SV-223015r428597_rule
- SV-59339
Checks: C-24688r428595_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page 'Turn on certificate address mismatch warning' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value "WarnOnBadCertRecving" is REG_DWORD = 1, this is not a finding.
Fix: F-24676r428596_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page 'Turn on certificate address mismatch warning' to 'Enabled'.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000185
- Version
- DTBI018-IE11
- Vuln IDs
-
- V-223016
- V-46477
- Rule IDs
-
- SV-223016r428600_rule
- SV-59341
Checks: C-24689r428598_chk
If the system is on the SIPRNet, this requirement is NA. Open Internet Explorer. From the menu bar, select "Tools". From the "Tools" drop-down menu, select "Internet Options". From the "Internet Options" window, select the "Advanced" tab, from the "Advanced" tab window, scroll down to the "Security" category, and verify the "Check for publisher's certificate revocation" box is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Criteria If the value "State" is "REG_DWORD = 23C00", this is not a finding.
Fix: F-24677r428599_fix
If the system is on the SIPRNet, this requirement is NA. Open Internet Explorer. From the menu bar, select "Tools". From the "Tools" drop-down menu, select "Internet Options". From the "Internet Options" window, select the "Advanced" tab from the "Advanced" tab window, scroll down to the "Security" category, and select the "Check for publisher's certificate revocation" box. Note: Manual entry in the registry key: HKCU\Software\Microsoft\Windows\Current Version\WinTrust\Trust Providers\Software Publishing for the value "State", set to "REG_DWORD = 23C00", may first be required.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTBI022-IE11
- Vuln IDs
-
- V-223017
- V-46481
- Rule IDs
-
- SV-223017r428603_rule
- SV-59345
Checks: C-24690r428601_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Download signed ActiveX controls' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1001" is REG_DWORD = 3, this is not a finding.
Fix: F-24678r428602_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Download signed ActiveX controls' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTBI023-IE11
- Vuln IDs
-
- V-223018
- V-46483
- Rule IDs
-
- SV-223018r428606_rule
- SV-59347
Checks: C-24691r428604_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Download unsigned ActiveX controls' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1004" is REG_DWORD = 3, this is not a finding.
Fix: F-24679r428605_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Download unsigned ActiveX controls' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI024-IE11
- Vuln IDs
-
- V-223019
- V-46501
- Rule IDs
-
- SV-223019r428609_rule
- SV-59365
Checks: C-24692r428607_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Initialize and script ActiveX controls not marked as safe' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1201" is REG_DWORD = 3, this is not a finding.
Fix: F-24680r428608_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Initialize and script ActiveX controls not marked as safe' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI031-IE11
- Vuln IDs
-
- V-223020
- V-46507
- Rule IDs
-
- SV-223020r428612_rule
- SV-59371
Checks: C-24693r428610_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Java permissions' must be 'Enabled', and 'Disable Java' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1C00" is REG_DWORD = 0, this is not a finding.
Fix: F-24681r428611_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Java permissions' to 'Enabled', and select 'Disable Java' from the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI032-IE11
- Vuln IDs
-
- V-223021
- V-46509
- Rule IDs
-
- SV-223021r428615_rule
- SV-59373
Checks: C-24694r428613_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Access data sources across domains' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1406" is REG_DWORD = 3, this is not a finding.
Fix: F-24682r428614_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Access data sources across domains' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI036-IE11
- Vuln IDs
-
- V-223022
- V-46511
- Rule IDs
-
- SV-223022r428618_rule
- SV-59375
Checks: C-24695r428616_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow drag and drop or copy and paste files' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value for "1802" is REG_DWORD = 3, this is not a finding.
Fix: F-24683r428617_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow drag and drop or copy and paste files' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI038-IE11
- Vuln IDs
-
- V-223023
- V-46513
- Rule IDs
-
- SV-223023r428621_rule
- SV-59377
Checks: C-24696r428619_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Launching applications and files in an IFRAME' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1804" is REG_DWORD = 3, this is not a finding.
Fix: F-24684r428620_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Launching applications and files in an IFRAME' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI039-IE11
- Vuln IDs
-
- V-223024
- V-46515
- Rule IDs
-
- SV-223024r428624_rule
- SV-59379
Checks: C-24697r428622_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Navigate windows and frames across different domains' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\InternetSettings\Zones\3 Criteria: If the value "1607" is REG_DWORD = 3, this is not a finding.
Fix: F-24685r428623_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Navigate windows and frames across different domains' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTBI042-IE11
- Vuln IDs
-
- V-223025
- V-46517
- Rule IDs
-
- SV-223025r428627_rule
- SV-59381
Checks: C-24698r428625_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Userdata persistence' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1606" is REG_DWORD = 3, this is not a finding.
Fix: F-24686r428626_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Userdata persistence' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI044-IE11
- Vuln IDs
-
- V-223026
- V-46521
- Rule IDs
-
- SV-223026r428630_rule
- SV-59385
Checks: C-24699r428628_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow cut, copy or paste operations from the clipboard via script' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1407" is REG_DWORD = 3, this is not a finding.
Fix: F-24687r428629_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow cut, copy or paste operations from the clipboard via script' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- DTBI046-IE11
- Vuln IDs
-
- V-223027
- V-46523
- Rule IDs
-
- SV-223027r428633_rule
- SV-59387
Checks: C-24700r428631_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Logon options' must be 'Enabled', and 'Prompt for user name and password' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1A00" is REG_DWORD = 65536 (decimal), this is not a finding.
Fix: F-24688r428632_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Logon options' to 'Enabled', and select 'Prompt for user name and password' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI061-IE11
- Vuln IDs
-
- V-223028
- V-46525
- Rule IDs
-
- SV-223028r428636_rule
- SV-59389
Checks: C-24701r428634_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> 'Java permissions' must be 'Enabled', and 'High Safety' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1 Criteria: If the value "1C00" is REG_DWORD = 65536, (Decimal), this is not a finding.
Fix: F-24689r428635_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Intranet Zone -> 'Java permissions' to 'Enabled', and select 'High Safety' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTBI062-IE11
- Vuln IDs
-
- V-223029
- V-46999
- Rule IDs
-
- SV-223029r428639_rule
- SV-59865
Checks: C-24702r428637_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Intranet Zone 'Don't run antimalware programs against ActiveX controls' must be 'Enabled' and 'Disable' selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1 Criteria: If the value "270C" is REG_DWORD = 0, this is not a finding.
Fix: F-24690r428638_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Intranet Zone 'Don't run antimalware programs against ActiveX controls' to 'Enabled' and select 'Disable' in the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI091-IE11
- Vuln IDs
-
- V-223030
- V-46543
- Rule IDs
-
- SV-223030r428642_rule
- SV-59407
Checks: C-24703r428640_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> 'Java permissions' must be 'Enabled', and 'High Safety' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 Criteria: If the value "1C00" is REG_DWORD = 65536, (Decimal), this is not a finding.
Fix: F-24691r428641_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Trusted Sites Zone -> 'Java permissions' to 'Enabled', and select 'High Safety' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTBI092-IE11
- Vuln IDs
-
- V-223031
- V-47009
- Rule IDs
-
- SV-223031r428645_rule
- SV-59875
Checks: C-24704r428643_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Trusted Sites Zone 'Don't run antimalware programs against ActiveX controls' must be 'Enabled' and 'Disable' selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 Criteria: If the value "270C" is REG_DWORD = 0, this is not a finding.
Fix: F-24692r428644_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Trusted Sites Zone 'Don't run antimalware programs against ActiveX controls' to 'Enabled' and select 'Disable' in the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI1000-IE11
- Vuln IDs
-
- V-223032
- V-46545
- Rule IDs
-
- SV-223032r428648_rule
- SV-59409
Checks: C-24705r428646_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone 'Enable dragging of content from different domains within a window' must be 'Enabled', and 'Disabled' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2708" is REG_DWORD = 3, this is not a finding.
Fix: F-24693r428647_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone 'Enable dragging of content from different domains within a window' to 'Enabled', and select 'Disabled' from the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI1005-IE11
- Vuln IDs
-
- V-223033
- V-46547
- Rule IDs
-
- SV-223033r428651_rule
- SV-59411
Checks: C-24706r428649_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone 'Enable dragging of content from different domains across windows' must be 'Enabled', and 'Disabled' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2709" is REG_DWORD = 3, this is not a finding.
Fix: F-24694r428650_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone 'Enable dragging of content from different domains across windows' to 'Enabled', and select 'Disabled' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTBI1010-IE11
- Vuln IDs
-
- V-223034
- V-46549
- Rule IDs
-
- SV-223034r428654_rule
- SV-59413
Checks: C-24707r428652_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value "explorer.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24695r428653_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTBI1020-IE11
- Vuln IDs
-
- V-223035
- V-46553
- Rule IDs
-
- SV-223035r428657_rule
- SV-59417
Checks: C-24708r428655_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24696r428656_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI1025-IE11
- Vuln IDs
-
- V-223036
- V-46555
- Rule IDs
-
- SV-223036r428660_rule
- SV-59419
Checks: C-24709r428658_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone 'Enable dragging of content from different domains within a window' must be 'Enabled', and 'Disabled' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2708" is REG_DWORD = 3, this is not a finding.
Fix: F-24697r428659_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Restricted Sites Zone 'Enable dragging of content from different domains within a window' to 'Enabled', and select 'Disabled' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTBI1046-IE11
- Vuln IDs
-
- V-223037
- V-46997
- Rule IDs
-
- SV-223037r428663_rule
- SV-59863
Checks: C-24710r428661_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Internet Zone 'Don't run antimalware programs against ActiveX controls' must be 'Enabled' and 'Disable' selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "270C" is REG_DWORD = 0, this is not a finding.
Fix: F-24698r428662_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Internet Zone 'Don't run antimalware programs against ActiveX controls' to 'Enabled' and select 'Disable' in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTBI1051-IE11
- Vuln IDs
-
- V-223038
- V-47005
- Rule IDs
-
- SV-223038r428666_rule
- SV-59871
Checks: C-24711r428664_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Restricted Sites Zone 'Don't run antimalware programs against ActiveX controls' must be 'Enabled' and 'Disable' selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "270C" is REG_DWORD = 0, this is not a finding.
Fix: F-24699r428665_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Restricted Sites Zone 'Don't run antimalware programs against ActiveX controls' to 'Enabled' and select 'Disable' in the drop-down box.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- DTBI1060-IE11
- Vuln IDs
-
- V-223039
- V-64711
- Rule IDs
-
- SV-223039r428669_rule
- SV-79201
Checks: C-24712r428667_chk
If the system is on the SIPRNet, this requirement is NA. The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> ”Prevent bypassing SmartScreen Filter warnings” must be ”Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\PhishingFilter. Criteria: If the value "PreventOverride" is REG_DWORD = 1, this is not a finding.
Fix: F-24700r428668_fix
If the system is on the SIPRNet, this requirement is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> ”Prevent bypassing SmartScreen Filter warnings” to ”Enabled”.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTBI1065-IE11
- Vuln IDs
-
- V-223040
- V-64713
- Rule IDs
-
- SV-223040r428672_rule
- SV-79203
Checks: C-24713r428670_chk
If the system is on the SIPRNet, this requirement is NA. The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> ”Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the internet” must be ”Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\PhishingFilter. Criteria: If the value "PreventOverrideAppRepUnknown" is REG_DWORD = 1, this is not a finding.
Fix: F-24701r428671_fix
If the system is on the SIPRNet, this requirement is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> ”Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the internet” to ”Enabled”.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI1070-IE11
- Vuln IDs
-
- V-223041
- V-64715
- Rule IDs
-
- SV-223041r428675_rule
- SV-79205
Checks: C-24714r428673_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> ”Prevent per-user installation of ActiveX controls” must be ”Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Security\ActiveX. Criteria: If the value "BlockNonAdminActiveXInstall" is REG_DWORD = 1, this is not a finding.
Fix: F-24702r428674_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> ”Prevent per-user installation of ActiveX controls” to ”Enabled”.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- DTBI1075-IE11
- Vuln IDs
-
- V-223042
- V-64717
- Rule IDs
-
- SV-223042r428678_rule
- SV-79207
Checks: C-24715r428676_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> ”Prevent ignoring certificate errors” must be ”Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings. Criteria: If the value "PreventIgnoreCertErrors" is REG_DWORD = 1, this is not a finding.
Fix: F-24703r428677_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> ”Prevent ignoring certificate errors” to ”Enabled”.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- DTBI1080-IE11
- Vuln IDs
-
- V-223043
- V-64719
- Rule IDs
-
- SV-223043r428681_rule
- SV-79209
Checks: C-24716r428679_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Internet Zone >> ”Turn on SmartScreen Filter scan” must be ”Enabled” and ”Enable” selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3. Criteria: If the value "2301" is REG_DWORD = 0, this is not a finding.
Fix: F-24704r428680_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Internet Zone >> ”Turn on SmartScreen Filter scan” to ”Enabled”, and select ”Enable” from the drop-down box.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- DTBI1085-IE11
- Vuln IDs
-
- V-223044
- V-64721
- Rule IDs
-
- SV-223044r428684_rule
- SV-79211
Checks: C-24717r428682_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Restricted Sites Zone >> ”Turn on SmartScreen Filter scan” must be ”Enabled” and ”Enable” selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4. Criteria: If the value "2301" is REG_DWORD = 0, this is not a finding.
Fix: F-24705r428683_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Restricted Sites Zone >> ”Turn on SmartScreen Filter scan” to ”Enabled”, and select ”Enable” from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI1090-IE11
- Vuln IDs
-
- V-223045
- V-64723
- Rule IDs
-
- SV-223045r428687_rule
- SV-79213
Checks: C-24718r428685_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Intranet Zone >> ”Initialize and script ActiveX controls not marked as safe” must be ”Enabled” and ”Disable” selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1. Criteria: If the value "1201" is REG_DWORD = 3, this is not a finding.
Fix: F-24706r428686_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Intranet Zone >> ”Initialize and script ActiveX controls not marked as safe” to ”Enabled”, and select ”Disable” from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI1095-IE11
- Vuln IDs
-
- V-223046
- V-64725
- Rule IDs
-
- SV-223046r428690_rule
- SV-79215
Checks: C-24719r428688_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Trusted Sites Zone >> ”Initialize and script ActiveX controls not marked as safe” must be ”Enabled” and ”Disable” selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2. Criteria: If the value "1201" is REG_DWORD = 3, this is not a finding.
Fix: F-24707r428689_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Trusted Sites Zone >> ”Initialize and script ActiveX controls not marked as safe” to ”Enabled”, and select ”Disable” from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI1105-IE11
- Vuln IDs
-
- V-223048
- V-72757
- Rule IDs
-
- SV-223048r428696_rule
- SV-87395
Checks: C-24721r428694_chk
In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Security Features >> Add-on Management, verify "Remove the Run this time button for outdated ActiveX controls in IE" is set to “Enabled”. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Ext If the value "RunThisTimeEnabled" is REG_DWORD = 0, this is not a finding.
Fix: F-24709r428695_fix
In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Security Features >> Add-on Management, set "Remove the Run this time button for outdated ActiveX controls in IE" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI1110-IE11
- Vuln IDs
-
- V-223049
- V-72759
- Rule IDs
-
- SV-223049r428699_rule
- SV-87397
Checks: C-24722r428697_chk
In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Security Features >> Add-on Management, verify "Turn off blocking of outdated ActiveX controls for Internet Explorer" is set to “Disabled”. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Ext If the value "VersionCheckEnabled" is REG_DWORD = 1, this is not a finding.
Fix: F-24710r428698_fix
In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Security Features >> Add-on Management, set "Turn off blocking of outdated ActiveX controls for Internet Explorer" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI1115-IE11
- Vuln IDs
-
- V-223050
- V-72761
- Rule IDs
-
- SV-223050r428702_rule
- SV-87399
Checks: C-24723r428700_chk
Note: Only applies to Windows 10 version 1607 and higher and Windows Server 2016 systems. For other Windows versions, this check is Not Applicable. In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Internet Zone, verify "Allow only approved domains to use the TDC ActiveX control" is “Enabled”. In the Options window, verify the “Only allow approved domains to use the TDC ActiveX control" drop-down box is set to “Enable”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "120c" is REG_DWORD = “3”, this is not a finding.
Fix: F-24711r428701_fix
In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Pane >> Security Page >> Internet Zone, set the "Allow only approved domains to use the TDC ActiveX control" to “Enabled”. In the Options window, select "Enable" from the “Only allow approved domains to use the TDC ActiveX control" drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTBI112-IE11
- Vuln IDs
-
- V-223051
- V-46573
- Rule IDs
-
- SV-223051r428705_rule
- SV-59437
Checks: C-24724r428703_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Download signed ActiveX controls' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1001" is REG_DWORD = 3, this is not a finding.
Fix: F-24712r428704_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Download signed ActiveX controls' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI1120-IE11
- Vuln IDs
-
- V-223052
- V-72763
- Rule IDs
-
- SV-223052r428708_rule
- SV-87401
Checks: C-24725r428706_chk
Note: Only applies to Windows 10 version 1607 and higher and Windows Server 2016 systems. For other Windows versions, this check is Not Applicable. In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Restricted Sites Zone, verify "Allow only approved domains to use the TDC ActiveX control" is “Enabled”. In the Options window, verify the “Only allow approved domains to use the TDC ActiveX control" drop-down box is set to “Enable”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "120c" is REG_DWORD = “3”, this is not a finding.
Fix: F-24713r428707_fix
In the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Restricted Sites Zone, set the "Allow only approved domains to use the TDC ActiveX control" to “Enabled”. In the Options windows, select "Enable" from the “Only allow approved domains to use the TDC ActiveX control" drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTBI1125-IE11
- Vuln IDs
-
- V-223053
- V-75169
- Rule IDs
-
- SV-223053r428711_rule
- SV-89849
Checks: C-24726r428709_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Internet Zone >> "Allow VBScript to run in Internet Explorer" must be "Enabled", and "Disable" must be selected from the drop-down box. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 If the value for "140C" is not REG_DWORD = 3, this is a finding. Note: This policy setting will only exist on Windows 10 Redstone 2 or later, and is otherwise not applicable.
Fix: F-24714r428710_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Internet Zone >> "Allow VBScript to run in Internet Explorer" to "Enabled" and select "Disable" from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTBI113-IE11
- Vuln IDs
-
- V-223054
- V-46575
- Rule IDs
-
- SV-223054r428714_rule
- SV-59439
Checks: C-24727r428712_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Download unsigned ActiveX controls' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1004" is REG_DWORD = 3, this is not a finding.
Fix: F-24715r428713_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Download unsigned ActiveX controls' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTBI1130-IE11
- Vuln IDs
-
- V-223055
- V-75171
- Rule IDs
-
- SV-223055r428717_rule
- SV-89851
Checks: C-24728r428715_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Restricted Sites Zone >> "Allow VBScript to run in Internet Explorer" must be "Enabled", and "Disable" must be selected from the drop-down box. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 If the value for "140C" is not REG_DWORD = 3, this is a finding. Note: This policy setting will only exist on Windows 10 Redstone 2 or later, and is otherwise not applicable.
Fix: F-24716r428716_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Security Page >> Restricted Sites Zone >> "Allow VBScript to run in Internet Explorer" to "Enabled" and select "Disable" from the drop-down box.
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- DTBI1135-IE11
- Vuln IDs
-
- V-223056
- V-97527
- Rule IDs
-
- SV-223056r428720_rule
- SV-106631
Checks: C-24729r428718_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Toolbars >> “Turn off Developer Tools” must be “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKEY_LOCAL_Machine\SOFTWARE\Policies\Microsoft\Internet Explorer\IEDevTools Criteria: If the value "Disabled" is REG_DWORD = 1, this is not a finding.
Fix: F-24717r428719_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Toolbars >> “Turn off Developer Tools” to “Enabled”.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI114-IE11
- Vuln IDs
-
- V-223057
- V-46577
- Rule IDs
-
- SV-223057r428723_rule
- SV-59441
Checks: C-24730r428721_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Initialize and script ActiveX controls not marked as safe' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1201" is REG_DWORD = 3, this is not a finding.
Fix: F-24718r428722_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Initialize and script ActiveX controls not marked as safe' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI115-IE11
- Vuln IDs
-
- V-223058
- V-46579
- Rule IDs
-
- SV-223058r428726_rule
- SV-59443
Checks: C-24731r428724_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Run ActiveX controls and plugins' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1200" is REG_DWORD = 3, this is not a finding.
Fix: F-24719r428725_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Run ActiveX controls and plugins' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI116-IE11
- Vuln IDs
-
- V-223059
- V-46581
- Rule IDs
-
- SV-223059r428729_rule
- SV-59445
Checks: C-24732r428727_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Script ActiveX controls marked safe for scripting' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1405" is REG_DWORD = 3, this is not a finding.
Fix: F-24720r428728_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Script ActiveX controls marked safe for scripting' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI119-IE11
- Vuln IDs
-
- V-223060
- V-46583
- Rule IDs
-
- SV-223060r428732_rule
- SV-59447
Checks: C-24733r428730_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow file downloads' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1803" is REG_DWORD = 3, this is not a finding.
Fix: F-24721r428731_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow file downloads' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI121-IE11
- Vuln IDs
-
- V-223061
- V-46587
- Rule IDs
-
- SV-223061r428735_rule
- SV-59451
Checks: C-24734r428733_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Java permissions' must be 'Enabled', and 'Disable Java' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1C00" is REG_DWORD = 0, this is not a finding.
Fix: F-24722r428734_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Java permissions' to 'Enabled', and select 'Disable Java' from the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI122-IE11
- Vuln IDs
-
- V-223062
- V-46589
- Rule IDs
-
- SV-223062r428738_rule
- SV-59453
Checks: C-24735r428736_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Access data sources across domains' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1406" is REG_DWORD = 3, this is not a finding.
Fix: F-24723r428737_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Access data sources across domains' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI123-IE11
- Vuln IDs
-
- V-223063
- V-46591
- Rule IDs
-
- SV-223063r428741_rule
- SV-59455
Checks: C-24736r428739_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow META REFRESH' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1608" is REG_DWORD = 3, this is not a finding.
Fix: F-24724r428740_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow META REFRESH' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI126-IE11
- Vuln IDs
-
- V-223064
- V-46593
- Rule IDs
-
- SV-223064r428744_rule
- SV-59457
Checks: C-24737r428742_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow drag and drop or copy and paste files' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1802" is REG_DWORD=3, this is not a finding.
Fix: F-24725r428743_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow drag and drop or copy and paste files' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI128-IE11
- Vuln IDs
-
- V-223065
- V-46597
- Rule IDs
-
- SV-223065r428747_rule
- SV-59461
Checks: C-24738r428745_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Launching applications and files in an IFRAME' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1804" is REG_DWORD = 3, this is not a finding.
Fix: F-24726r428746_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Launching applications and files in an IFRAME' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI129-IE11
- Vuln IDs
-
- V-223066
- V-46599
- Rule IDs
-
- SV-223066r428750_rule
- SV-59463
Checks: C-24739r428748_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Navigate windows and frames across different domains' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1607" is REG_DWORD = 3, this is not a finding.
Fix: F-24727r428749_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Navigate windows and frames across different domains' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTBI132-IE11
- Vuln IDs
-
- V-223067
- V-46601
- Rule IDs
-
- SV-223067r428753_rule
- SV-59465
Checks: C-24740r428751_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Userdata persistence' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1606" is REG_DWORD = 3, this is not a finding.
Fix: F-24728r428752_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Userdata persistence' to 'Enabled', and select 'Disable' from the drop-down box
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI133-IE11
- Vuln IDs
-
- V-223068
- V-46603
- Rule IDs
-
- SV-223068r428756_rule
- SV-59467
Checks: C-24741r428754_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow active scripting' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1400" is REG_DWORD = 3, this is not a finding.
Fix: F-24729r428755_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow active scripting' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI134-IE11
- Vuln IDs
-
- V-223069
- V-46605
- Rule IDs
-
- SV-223069r428759_rule
- SV-59469
Checks: C-24742r428757_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow cut, copy or paste operations from the clipboard via script' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1407" is REG_DWORD = 3, this is not a finding.
Fix: F-24730r428758_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow cut, copy or paste operations from the clipboard via script' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- DTBI136-IE11
- Vuln IDs
-
- V-223070
- V-46607
- Rule IDs
-
- SV-223070r428762_rule
- SV-59471
Checks: C-24743r428760_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Logon options' must be 'Enabled', and 'Anonymous logon' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1A00" is REG_DWORD = 196608 (decimal), this is not a finding.
Fix: F-24731r428761_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Logon options' to 'Enabled', and select 'Anonymous logon' from the drop-down box.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBI300-IE11
- Vuln IDs
-
- V-223071
- V-46609
- Rule IDs
-
- SV-223071r428765_rule
- SV-59473
Checks: C-24744r428763_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> 'Disable Configuring History' must be 'Enabled', and '40' entered in 'Days to keep pages in History'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel Criteria: If the value "History" is REG_DWORD = 1, this is not a finding. AND Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Url History Criteria: If the value "DaysToKeep" is REG_DWORD = 40 (decimal), this is not a finding.
Fix: F-24732r428764_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> 'Disable Configuring History' to 'Enabled', and enter '40' in 'Days to keep pages in History'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI318-IE11
- Vuln IDs
-
- V-223072
- V-46615
- Rule IDs
-
- SV-223072r428768_rule
- SV-59479
Checks: C-24745r428766_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer 'Security Zones: Do not allow users to add/delete sites' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value "Security_zones_map_edit" is REG_DWORD = 1, this is not a finding.
Fix: F-24733r428767_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer 'Security Zones: Do not allow users to add/delete sites' to 'Enabled'.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI319-IE11
- Vuln IDs
-
- V-223073
- V-46617
- Rule IDs
-
- SV-223073r428771_rule
- SV-59481
Checks: C-24746r428769_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer 'Security Zones: Do not allow users to change policies' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value "Security_options_edit" is REG_DWORD = 1, this is not a finding.
Fix: F-24734r428770_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer 'Security Zones: Do not allow users to change policies' to 'Enabled'.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI320-IE11
- Vuln IDs
-
- V-223074
- V-46619
- Rule IDs
-
- SV-223074r428774_rule
- SV-59483
Checks: C-24747r428772_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer 'Security Zones: Use only machine settings' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value "Security_HKLM_only" is REG_DWORD = 1, this is not a finding.
Fix: F-24735r428773_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer 'Security Zones: Use only machine settings' to 'Enabled'.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI325-IE11
- Vuln IDs
-
- V-223075
- V-46621
- Rule IDs
-
- SV-223075r428777_rule
- SV-59485
Checks: C-24748r428775_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Turn off the Security Settings Check feature' must be 'Disabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Security Criteria: If the value "DisableSecuritySettingsCheck" is REG_DWORD = 0, this is not a finding.
Fix: F-24736r428776_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Turn off the Security Settings Check feature' to 'Disabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI350-IE11
- Vuln IDs
-
- V-223076
- V-46625
- Rule IDs
-
- SV-223076r428780_rule
- SV-59489
Checks: C-24749r428778_chk
Note: Some legitimate software and controls may have an invalid signature. You should carefully test such software in isolation before it is allowed to be used on an organization's network. The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> 'Allow software to run or install even if the signature is invalid' must be 'Disabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Download Criteria: If the value "RunInvalidSignatures" is REG_DWORD = 0, this is not a finding.
Fix: F-24737r428779_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> 'Allow software to run or install even if the signature is invalid' to 'Disabled'.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- DTBI356-IE11
- Vuln IDs
-
- V-223077
- V-46995
- Rule IDs
-
- SV-223077r428783_rule
- SV-59861
Checks: C-24750r428781_chk
Note: If McAfee ENS Web Control is being used, this is Not Applicable. The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Advanced Page 'Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value "Isolation64Bit" is REG_DWORD = 1, this is not a finding.
Fix: F-24738r428782_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Advanced Page 'Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows' to 'Enabled'.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000185
- Version
- DTBI365-IE11
- Vuln IDs
-
- V-223078
- V-46629
- Rule IDs
-
- SV-223078r428786_rule
- SV-59493
Checks: C-24751r428784_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> 'Check for server certificate revocation' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Criteria: If the value "CertificateRevocation" is REG_DWORD = 1, this is not a finding.
Fix: F-24739r428785_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> 'Check for server certificate revocation' to 'Enabled'.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTBI370-IE11
- Vuln IDs
-
- V-223079
- V-46633
- Rule IDs
-
- SV-223079r428789_rule
- SV-59497
Checks: C-24752r428787_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> 'Check for signatures on downloaded programs' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Download Criteria: If the value "CheckExeSignatures" is REG_SZ = yes, this is not a finding.
Fix: F-24740r428788_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Advanced Page -> 'Check for signatures on downloaded programs' to 'Enabled'.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI375-IE11
- Vuln IDs
-
- V-223080
- V-46635
- Rule IDs
-
- SV-223080r428792_rule
- SV-59499
Checks: C-24753r428790_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> 'Intranet Sites: Include all network paths (UNCs)' must be 'Disabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap Criteria: If the value "UNCAsIntranet" is REG_DWORD = 0, this is not a finding.
Fix: F-24741r428791_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> 'Intranet Sites: Include all network paths (UNCs)' to 'Disabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI385-IE11
- Vuln IDs
-
- V-223081
- V-46637
- Rule IDs
-
- SV-223081r428795_rule
- SV-59501
Checks: C-24754r428793_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow script-initiated windows without size or position constraints' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2102" is REG_DWORD = 3, this is not a finding.
Fix: F-24742r428794_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow script-initiated windows without size or position constraints' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI390-IE11
- Vuln IDs
-
- V-223082
- V-46639
- Rule IDs
-
- SV-223082r428798_rule
- SV-59503
Checks: C-24755r428796_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow script-initiated windows without size or position constraints' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2102" is REG_DWORD = 3, this is not a finding.
Fix: F-24743r428797_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow script-initiated windows without size or position constraints' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI395-IE11
- Vuln IDs
-
- V-223083
- V-46641
- Rule IDs
-
- SV-223083r428801_rule
- SV-59505
Checks: C-24756r428799_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow Scriptlets' must be 'Enabled', and 'Disable' from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1209" is REG_DWORD = 3, this is not a finding.
Fix: F-24744r428800_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow Scriptlets' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI415-IE11
- Vuln IDs
-
- V-223084
- V-46643
- Rule IDs
-
- SV-223084r428804_rule
- SV-59507
Checks: C-24757r428802_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Automatic prompting for file downloads' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2200" is REG_DWORD = 3, this is not a finding.
Fix: F-24745r428803_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Automatic prompting for file downloads' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI425-IE11
- Vuln IDs
-
- V-223085
- V-46645
- Rule IDs
-
- SV-223085r428807_rule
- SV-59509
Checks: C-24758r428805_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> 'Java permissions' must be 'Enabled', and 'Disable Java' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 Criteria: If the value "1C00" is REG_DWORD = 0, this is not a finding.
Fix: F-24746r428806_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Local Machine Zone -> 'Java permissions' to 'Enabled', and select 'Disable Java' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTBI426-IE11
- Vuln IDs
-
- V-223086
- V-47003
- Rule IDs
-
- SV-223086r428810_rule
- SV-59869
Checks: C-24759r428808_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page ->Local Machine Zone 'Don't run antimalware programs against ActiveX controls' must be 'Enabled' and 'Disable' selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 Criteria: If the value "270C" is REG_DWORD = 0, this is not a finding.
Fix: F-24747r428809_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel -> Security Page -> Local Machine Zone 'Don't run antimalware programs against ActiveX controls' to 'Enabled' and select 'Disable' in the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI430-IE11
- Vuln IDs
-
- V-223087
- V-46647
- Rule IDs
-
- SV-223087r428813_rule
- SV-59511
Checks: C-24760r428811_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> 'Java permissions' must be 'Enabled', and 'Disable Java' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0 Criteria: If the value "1C00" is REG_DWORD = 0, this is not a finding.
Fix: F-24748r428812_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Local Machine Zone -> 'Java permissions' to 'Enabled', and select 'Disable Java' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI435-IE11
- Vuln IDs
-
- V-223088
- V-46649
- Rule IDs
-
- SV-223088r428816_rule
- SV-59513
Checks: C-24761r428814_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> 'Java permissions' must be 'Enabled', and 'Disable Java' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 Criteria: If the value" 1C00" is REG_DWORD = 0, this is not a finding.
Fix: F-24749r428815_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Intranet Zone -> 'Java permissions' to 'Enabled', and select 'Disable Java' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI440-IE11
- Vuln IDs
-
- V-223089
- V-46653
- Rule IDs
-
- SV-223089r428819_rule
- SV-59517
Checks: C-24762r428817_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> 'Java permissions' must be 'Enabled', and 'Disable Java' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2 Criteria: If the value "1C00" is REG_DWORD = 0, this is not a finding.
Fix: F-24750r428818_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Trusted Sites Zone -> 'Java permissions' to 'Enabled', and select 'Disable Java' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI450-IE11
- Vuln IDs
-
- V-223090
- V-46663
- Rule IDs
-
- SV-223090r428822_rule
- SV-59527
Checks: C-24763r428820_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> 'Java permissions' must be 'Enabled', and 'Disable Java' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following keys: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4 Criteria: If the value "1C00" is REG_DWORD = 0, this is not a finding.
Fix: F-24751r428821_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Locked-Down Restricted Sites Zone -> 'Java permissions' to 'Enabled', and select 'Disable Java' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI455-IE11
- Vuln IDs
-
- V-223091
- V-46665
- Rule IDs
-
- SV-223091r428825_rule
- SV-59529
Checks: C-24764r428823_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow loading of XAML files' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2402" is REG_DWORD = 3, this is not a finding.
Fix: F-24752r428824_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow loading of XAML files' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI460-IE11
- Vuln IDs
-
- V-223092
- V-46669
- Rule IDs
-
- SV-223092r428828_rule
- SV-59533
Checks: C-24765r428826_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow loading of XAML files' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2402" is REG_DWORD = 3, this is not a finding.
Fix: F-24753r428827_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow loading of XAML files' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- DTBI485-IE11
- Vuln IDs
-
- V-223093
- V-46681
- Rule IDs
-
- SV-223093r428831_rule
- SV-59545
Checks: C-24766r428829_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Turn on Protected Mode' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2500" is REG_DWORD = 0, this is not a finding.
Fix: F-24754r428830_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Turn on Protected Mode' to 'Enabled', and select 'Enable' from the drop-down box.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- DTBI490-IE11
- Vuln IDs
-
- V-223094
- V-46685
- Rule IDs
-
- SV-223094r428834_rule
- SV-59549
Checks: C-24767r428832_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Turn on Protected Mode' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2500" is REG_DWORD = 0, this is not a finding.
Fix: F-24755r428833_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Turn on Protected Mode' to 'Enabled' and select 'Enable', from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI495-IE11
- Vuln IDs
-
- V-223095
- V-46689
- Rule IDs
-
- SV-223095r428837_rule
- SV-59553
Checks: C-24768r428835_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Use Pop-up Blocker' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1809" is REG_DWORD = 0, this is not a finding.
Fix: F-24756r428836_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Use Pop-up Blocker' to 'Enabled', and select 'Enable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI500-IE11
- Vuln IDs
-
- V-223096
- V-46691
- Rule IDs
-
- SV-223096r428840_rule
- SV-59555
Checks: C-24769r428838_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Use Pop-up Blocker' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1809" is REG_DWORD = 0, this is not a finding.
Fix: F-24757r428839_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Use Pop-up Blocker' to 'Enabled', and select 'Enable' from the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI515-IE11
- Vuln IDs
-
- V-223097
- V-46693
- Rule IDs
-
- SV-223097r428843_rule
- SV-59557
Checks: C-24770r428841_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Web sites in less privileged Web content zones can navigate into this zone' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2101" is REG_DWORD = 3, this is not a finding.
Fix: F-24758r428842_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Web sites in less privileged Web content zones can navigate into this zone' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI520-IE11
- Vuln IDs
-
- V-223098
- V-46695
- Rule IDs
-
- SV-223098r428846_rule
- SV-59559
Checks: C-24771r428844_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Web sites in less privileged Web content zones can navigate into this zone' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2101" is REG_DWORD = 3, this is not a finding.
Fix: F-24759r428845_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Web sites in less privileged Web content zones can navigate into this zone' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI575-IE11
- Vuln IDs
-
- V-223099
- V-46701
- Rule IDs
-
- SV-223099r428849_rule
- SV-59565
Checks: C-24772r428847_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow binary and script behaviors' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2000" is REG_DWORD = 3, this is not a finding.
Fix: F-24760r428848_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow binary and script behaviors' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI580-IE11
- Vuln IDs
-
- V-223100
- V-46705
- Rule IDs
-
- SV-223100r428852_rule
- SV-59569
Checks: C-24773r428850_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Automatic prompting for file downloads' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2200" is REG_DWORD = 3, this is not a finding.
Fix: F-24761r428851_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Automatic prompting for file downloads' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBI590-IE11
- Vuln IDs
-
- V-223101
- V-46709
- Rule IDs
-
- SV-223101r428855_rule
- SV-59573
Checks: C-24774r428853_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24762r428854_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBI592-IE11
- Vuln IDs
-
- V-223102
- V-46711
- Rule IDs
-
- SV-223102r428858_rule
- SV-59575
Checks: C-24775r428856_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value "explorer.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24763r428857_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBI594-IE11
- Vuln IDs
-
- V-223103
- V-46713
- Rule IDs
-
- SV-223103r428861_rule
- SV-59577
Checks: C-24776r428859_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24764r428860_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Consistent Mime Handling -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBI595-IE11
- Vuln IDs
-
- V-223104
- V-46715
- Rule IDs
-
- SV-223104r428864_rule
- SV-59579
Checks: C-24777r428862_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24765r428863_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBI596-IE11
- Vuln IDs
-
- V-223105
- V-46717
- Rule IDs
-
- SV-223105r428867_rule
- SV-59581
Checks: C-24778r428865_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value "explorer.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24766r428866_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBI597-IE11
- Vuln IDs
-
- V-223106
- V-46719
- Rule IDs
-
- SV-223106r428870_rule
- SV-59583
Checks: C-24779r428868_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24767r428869_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Mime Sniffing Safety Feature -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI599-IE11
- Vuln IDs
-
- V-223107
- V-46721
- Rule IDs
-
- SV-223107r428873_rule
- SV-59585
Checks: C-24780r428871_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24768r428872_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI600-IE11
- Vuln IDs
-
- V-223108
- V-46723
- Rule IDs
-
- SV-223108r428876_rule
- SV-59587
Checks: C-24781r428874_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value "explorer.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24769r428875_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI605-IE11
- Vuln IDs
-
- V-223109
- V-46725
- Rule IDs
-
- SV-223109r428879_rule
- SV-59589
Checks: C-24782r428877_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24770r428878_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> MK Protocol Security Restriction -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- DTBI610-IE11
- Vuln IDs
-
- V-223110
- V-46727
- Rule IDs
-
- SV-223110r428882_rule
- SV-59591
Checks: C-24783r428880_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24771r428881_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- DTBI612-IE11
- Vuln IDs
-
- V-223111
- V-46729
- Rule IDs
-
- SV-223111r428885_rule
- SV-59593
Checks: C-24784r428883_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value "explorer.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24772r428884_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- DTBI614-IE11
- Vuln IDs
-
- V-223112
- V-46731
- Rule IDs
-
- SV-223112r428888_rule
- SV-59595
Checks: C-24785r428886_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24773r428887_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Protection From Zone Elevation -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI630-IE11
- Vuln IDs
-
- V-223113
- V-46733
- Rule IDs
-
- SV-223113r428891_rule
- SV-59597
Checks: C-24786r428889_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24774r428890_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI635-IE11
- Vuln IDs
-
- V-223114
- V-46779
- Rule IDs
-
- SV-223114r428894_rule
- SV-59645
Checks: C-24787r428892_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value "explorer.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24775r428893_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI640-IE11
- Vuln IDs
-
- V-223115
- V-46781
- Rule IDs
-
- SV-223115r428897_rule
- SV-59647
Checks: C-24788r428895_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24776r428896_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict File Download -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI645-IE11
- Vuln IDs
-
- V-223116
- V-46787
- Rule IDs
-
- SV-223116r428900_rule
- SV-59653
Checks: C-24789r428898_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24777r428899_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI647-IE11
- Vuln IDs
-
- V-223117
- V-46789
- Rule IDs
-
- SV-223117r428903_rule
- SV-59655
Checks: C-24790r428901_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value "explorer.exe is REG_SZ = 1, this is not a finding.
Fix: F-24778r428902_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI649-IE11
- Vuln IDs
-
- V-223118
- V-46791
- Rule IDs
-
- SV-223118r428906_rule
- SV-59657
Checks: C-24791r428904_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24779r428905_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Scripted Window Security Restrictions -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI650-IE11
- Vuln IDs
-
- V-223119
- V-46797
- Rule IDs
-
- SV-223119r428909_rule
- SV-59663
Checks: C-24792r428907_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Run .NET Framework-reliant components not signed with Authenticode' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2004" is REG_DWORD = 3, this is not a finding.
Fix: F-24780r428908_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Run .NET Framework-reliant components not signed with Authenticode' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI655-IE11
- Vuln IDs
-
- V-223120
- V-46799
- Rule IDs
-
- SV-223120r428912_rule
- SV-59665
Checks: C-24793r428910_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Run .NET Framework-reliant components signed with Authenticode' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2001" is REG_DWORD = 3, this is not a finding.
Fix: F-24781r428911_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Run .NET Framework-reliant components signed with Authenticode' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI670-IE11
- Vuln IDs
-
- V-223121
- V-46801
- Rule IDs
-
- SV-223121r428915_rule
- SV-59667
Checks: C-24794r428913_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Scripting of Java applets' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1402" is REG_DWORD = 3, this is not a finding.
Fix: F-24782r428914_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Scripting of Java applets' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI690-IE11
- Vuln IDs
-
- V-223122
- V-46807
- Rule IDs
-
- SV-223122r428918_rule
- SV-59673
Checks: C-24795r428916_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Disable AutoComplete for forms' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value "Use FormSuggest" is REG_SZ = no, this is not a finding.
Fix: F-24783r428917_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Disable AutoComplete for forms' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI715-IE11
- Vuln IDs
-
- V-223123
- V-46811
- Rule IDs
-
- SV-223123r428921_rule
- SV-59677
Checks: C-24796r428919_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Turn off Crash Detection' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key:HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions Criteria: If the value "NoCrashDetection" is REG_DWORD = 1, this is not a finding.
Fix: F-24784r428920_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Turn off Crash Detection' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI725-IE11
- Vuln IDs
-
- V-223124
- V-46815
- Rule IDs
-
- SV-223124r428924_rule
- SV-59681
Checks: C-24797r428922_chk
The policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Turn on the auto-complete feature for user names and passwords on forms' must be 'Disabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value "FormSuggest Passwords" is REG_SZ = 'no', this is not a finding. AND Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value "FormSuggest PW Ask" is REG_SZ = 'no', this is not a finding.
Fix: F-24785r428923_fix
Set the policy value for User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> 'Turn on the auto-complete feature for user names and passwords on forms' to 'Disabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBI740-IE11
- Vuln IDs
-
- V-223125
- V-46819
- Rule IDs
-
- SV-223125r428927_rule
- SV-59685
Checks: C-24798r428925_chk
If the system is on the SIPRNet, this requirement is NA. The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> "Prevent Managing SmartScreen Filter" must be "Enabled", and "On" selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\PhishingFilter Criteria: If the value "EnabledV9" is "REG_DWORD = 1", this is not a finding.
Fix: F-24786r428926_fix
If the system is on the SIPRNet, this requirement is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> "Prevent Managing SmartScreen Filter" to "Enabled", and select "On" from the drop-down box.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBI760-IE11
- Vuln IDs
-
- V-223126
- V-46829
- Rule IDs
-
- SV-223126r428930_rule
- SV-59695
Checks: C-24799r428928_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> 'Allow deleting browsing history on exit' must be 'Disabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value "ClearBrowsingHistoryOnExit" is REG_DWORD = 0, this is not a finding.
Fix: F-24787r428929_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> 'Allow deleting browsing history on exit' to 'Disabled'.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBI770-IE11
- Vuln IDs
-
- V-223127
- V-46841
- Rule IDs
-
- SV-223127r428933_rule
- SV-59707
Checks: C-24800r428931_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> 'Prevent Deleting Web sites that the User has Visited' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value "CleanHistory" is REG_DWORD = 0, this is not a finding.
Fix: F-24788r428932_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Delete Browsing History -> 'Prevent Deleting Web sites that the User has Visited' to 'Enabled'.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- DTBI780-IE11
- Vuln IDs
-
- V-223128
- V-46847
- Rule IDs
-
- SV-223128r428936_rule
- SV-59713
Checks: C-24801r428934_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Privacy -> 'Turn off InPrivate Browsing' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Privacy Criteria: If the value "EnableInPrivateBrowsing" is REG_DWORD = 0, this is not a finding.
Fix: F-24789r428935_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Privacy -> 'Turn off InPrivate Browsing' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI800-IE11
- Vuln IDs
-
- V-223129
- V-46849
- Rule IDs
-
- SV-223129r428939_rule
- SV-59715
Checks: C-24802r428937_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow scripting of Internet Explorer WebBrowser controls' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1206" is REG_DWORD = 3, this is not a finding.
Fix: F-24790r428938_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow scripting of Internet Explorer WebBrowser controls' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI810-IE11
- Vuln IDs
-
- V-223130
- V-46853
- Rule IDs
-
- SV-223130r428942_rule
- SV-59719
Checks: C-24803r428940_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Include local path when user is uploading files to a server' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "160A" is REG_DWORD = 3, this is not a finding.
Fix: F-24791r428941_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Include local path when user is uploading files to a server' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI815-IE11
- Vuln IDs
-
- V-223131
- V-46857
- Rule IDs
-
- SV-223131r428945_rule
- SV-59723
Checks: C-24804r428943_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24792r428944_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI820-IE11
- Vuln IDs
-
- V-223132
- V-46859
- Rule IDs
-
- SV-223132r428948_rule
- SV-59725
Checks: C-24805r428946_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Show security warning for potentially unsafe files' must be 'Enabled', and 'Prompt' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1806" is REG_DWORD = 1, this is not a finding.
Fix: F-24793r428947_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Show security warning for potentially unsafe files' to 'Enabled', and select 'Prompt' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI825-IE11
- Vuln IDs
-
- V-223133
- V-46861
- Rule IDs
-
- SV-223133r428951_rule
- SV-59727
Checks: C-24806r428949_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value "explorer.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24794r428950_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI830-IE11
- Vuln IDs
-
- V-223134
- V-46865
- Rule IDs
-
- SV-223134r428954_rule
- SV-59729
Checks: C-24807r428952_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> ' Allow only approved domains to use ActiveX controls without prompt' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "120b" is REG_DWORD = 3, this is not a finding.
Fix: F-24795r428953_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Allow only approved domains to use ActiveX controls without prompt' to 'Enabled', and select 'Enable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI835-IE11
- Vuln IDs
-
- V-223135
- V-46869
- Rule IDs
-
- SV-223135r428957_rule
- SV-59735
Checks: C-24808r428955_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Criteria: If the value "iexplore.exe" is REG_SZ = 1, this is not a finding.
Fix: F-24796r428956_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features-> Notification Bar-> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI840-IE11
- Vuln IDs
-
- V-223136
- V-46879
- Rule IDs
-
- SV-223136r428960_rule
- SV-59745
Checks: C-24809r428958_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Turn on Cross-Site Scripting Filter' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "1409" is REG_DWORD = 0, this is not a finding.
Fix: F-24797r428959_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone -> 'Turn on Cross-Site Scripting Filter' to 'Enabled', and select 'Enable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI850-IE11
- Vuln IDs
-
- V-223137
- V-46883
- Rule IDs
-
- SV-223137r428963_rule
- SV-59749
Checks: C-24810r428961_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow scripting of Internet Explorer WebBrowser controls' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1206" is REG_DWORD = 3, this is not a finding.
Fix: F-24798r428962_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow scripting of Internet Explorer WebBrowser controls' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI860-IE11
- Vuln IDs
-
- V-223138
- V-46885
- Rule IDs
-
- SV-223138r428966_rule
- SV-59751
Checks: C-24811r428964_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Include local path when user is uploading files to a server' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "160A" is REG_DWORD = 3, this is not a finding.
Fix: F-24799r428965_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Include local path when user is uploading files to a server' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI870-IE11
- Vuln IDs
-
- V-223139
- V-46889
- Rule IDs
-
- SV-223139r428969_rule
- SV-59755
Checks: C-24812r428967_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Show security warning for potentially unsafe files' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1806" is REG_DWORD = 3, this is not a finding.
Fix: F-24800r428968_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Show security warning for potentially unsafe files' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBI880-IE11
- Vuln IDs
-
- V-223140
- V-46893
- Rule IDs
-
- SV-223140r428972_rule
- SV-59759
Checks: C-24813r428970_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow only approved domains to use ActiveX controls without prompt' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "120b" is REG_DWORD = 3, this is not a finding.
Fix: F-24801r428971_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Allow only approved domains to use ActiveX controls without prompt' to 'Enabled', and select 'Enable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI890-IE11
- Vuln IDs
-
- V-223141
- V-46895
- Rule IDs
-
- SV-223141r428975_rule
- SV-59761
Checks: C-24814r428973_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Turn on Cross-Site Scripting Filter' must be 'Enabled', and 'Enable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1409" is REG_DWORD = 0, this is not a finding.
Fix: F-24802r428974_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Turn on Cross-Site Scripting Filter' to 'Enabled', and select 'Enable' from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTBI900-IE11
- Vuln IDs
-
- V-223142
- V-46897
- Rule IDs
-
- SV-223142r428978_rule
- SV-59763
Checks: C-24815r428976_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> 'Internet Explorer Processes' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value "(Reserved)" is REG_SZ = 1, this is not a finding.
Fix: F-24803r428977_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Security Features -> Restrict ActiveX Install -> 'Internet Explorer Processes' to 'Enabled'.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI910-IE11
- Vuln IDs
-
- V-223143
- V-46903
- Rule IDs
-
- SV-223143r428981_rule
- SV-59769
Checks: C-24816r428979_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone 'Allow updates to status bar via script' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2103" is REG_DWORD = 3, this is not a finding.
Fix: F-24804r428980_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone 'Allow updates to status bar via script' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI920-IE11
- Vuln IDs
-
- V-223144
- V-46907
- Rule IDs
-
- SV-223144r428984_rule
- SV-59773
Checks: C-24817r428982_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone 'Run .NET Framework-reliant components not signed with Authenticode' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2004" is REG_DWORD = 3, this is not a finding.
Fix: F-24805r428983_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone 'Run .NET Framework-reliant components not signed with Authenticode' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI930-IE11
- Vuln IDs
-
- V-223145
- V-46921
- Rule IDs
-
- SV-223145r428987_rule
- SV-59787
Checks: C-24818r428985_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone 'Run .NET Framework-reliant components signed with Authenticode' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2001" is REG_DWORD = 3, this is not a finding.
Fix: F-24806r428986_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Internet Zone 'Run .NET Framework-reliant components signed with Authenticode' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI940-IE11
- Vuln IDs
-
- V-223146
- V-46927
- Rule IDs
-
- SV-223146r428990_rule
- SV-59793
Checks: C-24819r428988_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone 'Allow Scriptlets' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "1209" is REG_DWORD = 3, this is not a finding.
Fix: F-24807r428989_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone 'Allow Scriptlets' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBI950-IE11
- Vuln IDs
-
- V-223147
- V-46939
- Rule IDs
-
- SV-223147r428993_rule
- SV-59805
Checks: C-24820r428991_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone 'Allow updates to status bar via script' must be 'Enabled', and 'Disable' selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 Criteria: If the value "2103" is REG_DWORD = 3, this is not a finding.
Fix: F-24808r428992_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone 'Allow updates to status bar via script' to 'Enabled', and select 'Disable' from the drop-down box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBI985-IE11
- Vuln IDs
-
- V-223148
- V-46975
- Rule IDs
-
- SV-223148r428996_rule
- SV-59841
Checks: C-24821r428994_chk
Note: If McAfee ENS Web Control is being used, this is Not Applicable. The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page 'Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value "DisableEPMCompat" is REG_DWORD = 1, this is not a finding.
Fix: F-24809r428995_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page 'Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled' to 'Enabled'.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBI990-IE11
- Vuln IDs
-
- V-223149
- V-46981
- Rule IDs
-
- SV-223149r428999_rule
- SV-59847
Checks: C-24822r428997_chk
The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone 'Enable dragging of content from different domains across windows' must be 'Enabled', and 'Disabled' selected from the drop-down box. Procedure: Use the windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 Criteria: If the value "2709" is REG_DWORD = 3, this is not a finding.
Fix: F-24810r428998_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Security Page-> Internet Zone 'Enable dragging of content from different domains across windows' to 'Enabled', and select 'Disabled' from the drop-down box.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- DTBI995-IE11
- Vuln IDs
-
- V-223150
- V-46987
- Rule IDs
-
- SV-223150r429002_rule
- SV-59853
Checks: C-24823r429000_chk
Note: If McAfee ENS Web Control is being used, this is Not Applicable. The policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page 'Turn on Enhanced Protected Mode' must be 'Enabled'. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main Criteria: If the value "Isolation" is REG_SZ = 'PMEM', this is not a finding.
Fix: F-24811r429001_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer-> Internet Control Panel-> Advanced Page 'Turn on Enhanced Protected Mode' to 'Enabled'.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- DTBI014-IE11
- Vuln IDs
-
- V-250540
- V-46473
- Rule IDs
-
- SV-250540r804978_rule
- SV-59337
Checks: C-53975r804976_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Advanced Page >> "Turn off Encryption Support" must be "Enabled". Verify the only option selected is "Only use TLS 1.2" from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings!SecureProtocols. Criteria: If the value for "SecureProtocols" is not REG_DWORD = "2048", this is a finding.
Fix: F-53929r804977_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Internet Control Panel >> Advanced Page >> "Turn off Encryption Support" to "Enabled". Select only "Only use TLS 1.2" from the drop-down box.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- DTBI1100-IE11
- Vuln IDs
-
- V-250541
- V-64729
- Rule IDs
-
- SV-250541r799949_rule
- SV-79219
Checks: C-53976r799947_chk
The policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Security Features >> "Allow fallback to SSL 3.0 (Internet Explorer)" must be "Enabled", and "No Sites" selected from the drop-down box. If "Allow fallback to SSL 3.0 (Internet Explorer)" is not "Enabled" or any other drop-down option is selected, this is a finding. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings. Criteria: If the value "EnableSSL3Fallback" is REG_DWORD=0, this is not a finding.
Fix: F-53930r799948_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Internet Explorer >> Security Features >> "Allow fallback to SSL 3.0 (Internet Explorer)" to "Enabled", and select "No Sites" from the drop-down box.