Microsoft OneNote 2010
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R8). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 11 rules matched cleanly.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - OneNote
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-33896r2_rule
Checks: C-34308r4_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” must be “Enabled” and a check in the ‘onent.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29967r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” to “Enabled” and place a check in the ‘onent.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - OneNote
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-33891r2_rule
Checks: C-34293r4_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” must be “Enabled” and a check in the ‘onent.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29962r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” to “Enabled” and place a check in the ‘onent.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - OneNote
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-33917r2_rule
Checks: C-34342r4_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” must be “Enabled” and a check in the ‘onent.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29990r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” to “Enabled” and place a check in the ‘onent.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - OneNote
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-33899r2_rule
Checks: C-34320r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” must be “Enabled” and a check in the ‘onent.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29970r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” to “Enabled” and place a check in the ‘onent.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - OneNote
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-33893r2_rule
Checks: C-34300r4_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” must be “Enabled” and ‘onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29964r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” to “Enabled” and select ‘onent.exe'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO126 - OneNote
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-33888r2_rule
Checks: C-34279r4_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management” must be set to “Enabled” and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29959r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management” to “Enabled” and 'onent.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209 - OneNote
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-33902r2_rule
Checks: C-34332r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” must be set to “Enabled” and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29973r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” to “Enabled” and 'onent.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO211 - OneNote
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-33906r2_rule
Checks: C-34335r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” must be set to “Enabled” and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29981r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” to “Enabled” and 'onent.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO132 - OneNote
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-33914r2_rule
Checks: C-34339r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” must be set to “Enabled” and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29987r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” to “Enabled” and 'onent.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO124 - OneNote
- Vuln IDs
-
- V-26588
- Rule IDs
-
- SV-33920r2_rule
Checks: C-34345r3_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” must be set to “Enabled” and ‘onent.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29993r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” to “Enabled” and ‘onent.exe’ is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO128 - OneNote
- Vuln IDs
-
- V-26590
- Rule IDs
-
- SV-33934r1_rule
Checks: C-34375r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft OneNote 2010 -> OneNote Options -> Security -> Trust Center “Turn off Data Execution Prevention” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\onenote\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-30011r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft OneNote 2010 -> OneNote Options -> Security -> Trust Center “Turn off Data Execution Prevention” to “Disabled”.