Microsoft OneNote 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +11 −10
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 11
- V-238044 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-238045 Medium Enabling IE Bind to Object functionality must be present.
- V-238046 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-238047 Medium Navigation to URLs embedded in Office products must be blocked.
- V-238048 Medium Scripted Window Security must be enforced.
- V-238049 Medium Add-on Management functionality must be allowed.
- V-238050 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-238051 Medium File Downloads must be configured for proper restrictions.
- V-238052 Medium Protection from zone elevation must be enforced.
- V-238053 Medium ActiveX Installs must be configured for proper restriction.
- V-279944 High The version of OneNote running on the system must be a supported version.
Removed rules 10
- V-70829 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-70831 Medium Enabling IE Bind to Object functionality must be present.
- V-70833 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-70835 Medium Navigation to URLs embedded in Office products must be blocked.
- V-70837 Medium Add-on Management functionality must be allowed.
- V-70839 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-70841 Medium File Downloads must be configured for proper restrictions.
- V-70843 Medium Protection from zone elevation must be enforced.
- V-70845 Medium ActiveX Installs must be configured for proper restriction.
- V-70847 Medium Scripted Window Security must be enforced.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-238044
- V-70829
- Rule IDs
-
- SV-238044r961092_rule
- SV-85453
Checks: C-41254r650728_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41213r650729_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-238045
- V-70831
- Rule IDs
-
- SV-238045r960921_rule
- SV-85455
Checks: C-41255r650731_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41214r650732_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-238046
- V-70833
- Rule IDs
-
- SV-238046r961092_rule
- SV-85457
Checks: C-41256r650734_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41215r650735_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-238047
- V-70835
- Rule IDs
-
- SV-238047r961092_rule
- SV-85459
Checks: C-41257r650737_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41216r650738_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-238048
- V-70847
- Rule IDs
-
- SV-238048r960921_rule
- SV-85471
Checks: C-41258r650740_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41217r650741_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-238049
- V-70837
- Rule IDs
-
- SV-238049r961086_rule
- SV-85461
Checks: C-41259r650743_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41218r650744_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-238050
- V-70839
- Rule IDs
-
- SV-238050r961086_rule
- SV-85463
Checks: C-41260r650746_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41219r650747_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-238051
- V-70841
- Rule IDs
-
- SV-238051r961089_rule
- SV-85465
Checks: C-41261r650749_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41220r650750_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-238052
- V-70843
- Rule IDs
-
- SV-238052r960921_rule
- SV-85467
Checks: C-41262r650752_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41221r650753_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-238053
- V-70845
- Rule IDs
-
- SV-238053r961779_rule
- SV-85469
Checks: C-41263r650755_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'onent.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41222r650756_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'onent.exe' check box.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTO-OneNote999
- Vuln IDs
-
- V-279944
- Rule IDs
-
- SV-279944r1156581_rule
Checks: C-84505r1156579_chk
OneNote 2016 is no longer supported by the vendor. If the system is running OneNote 2016, this is a finding.
Fix: F-84410r1156580_fix
Upgrade to a supported version.