Microsoft Project 2010 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +13 −12
Comparison against the immediately-prior release (V1R7). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 13
- V-242219 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-242220 Medium Enabling IE Bind to Object functionality must be present.
- V-242221 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-242222 Medium Navigation to URL's embedded in Office products must be blocked.
- V-242223 Medium Scripted Window Security must be enforced.
- V-242224 Medium Add-on Management functionality must be allowed.
- V-242225 Medium Data Execution Prevention must be enforced.
- V-242226 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-242227 Medium File Downloads must be configured for proper restrictions.
- V-242228 Medium Protection from zone elevation must be enforced.
- V-242229 Medium ActiveX Installs must be configured for proper restriction.
- V-242230 Medium Untrusted intranet zone access to Project servers must not be allowed.
- V-265896 High The version of Microsoft Project running on the system must be a supported version.
Removed rules 12
- V-17173 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-17174 Medium Enabling IE Bind to Object functionality must be present.
- V-17175 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-17183 Medium Navigation to URL's embedded in Office products must be blocked.
- V-17184 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-26584 Medium Add-on Management functionality must be allowed.
- V-26585 Medium Protection from zone elevation must be enforced.
- V-26586 Medium ActiveX Installs must be configured for proper restriction.
- V-26587 Medium File Downloads must be configured for proper restrictions.
- V-26588 Medium Scripted Window Security must be enforced.
- V-26590 Medium Data Execution Prevention must be enforced.
- V-26691 Medium Untrusted intranet zone access to Project servers must not be allowed.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104 - Project
- Vuln IDs
-
- V-242219
- V-17173
- Rule IDs
-
- SV-242219r961092_rule
- SV-33897
Checks: C-45494r710308_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" must be "Enabled" and a check in the "winproj.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45452r710309_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the "winproj.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111 - Project
- Vuln IDs
-
- V-242220
- V-17174
- Rule IDs
-
- SV-242220r960921_rule
- SV-33889
Checks: C-45495r710311_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the "winproj.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45453r710312_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the "winproj.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117 - Project
- Vuln IDs
-
- V-242221
- V-17175
- Rule IDs
-
- SV-242221r961092_rule
- SV-33918
Checks: C-45496r710314_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the "winproj.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45454r710315_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the "winproj.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123 - Project
- Vuln IDs
-
- V-242222
- V-17183
- Rule IDs
-
- SV-242222r961092_rule
- SV-33898
Checks: C-45497r710317_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the "winproj.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45455r710318_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the "winproj.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124 - Project
- Vuln IDs
-
- V-242223
- V-26588
- Rule IDs
-
- SV-242223r960921_rule
- SV-33921
Checks: C-45498r710320_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" must be set to "Enabled" and "winproj.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45456r710321_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and "winproj.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126 - Project
- Vuln IDs
-
- V-242224
- V-26584
- Rule IDs
-
- SV-242224r961086_rule
- SV-33886
Checks: C-45499r710323_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management" must be set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45457r710324_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and 'winproj.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO128 - Project
- Vuln IDs
-
- V-242225
- V-26590
- Rule IDs
-
- SV-242225r961092_rule
- SV-33925
Checks: C-45500r710326_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Project 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\ms project\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-45458r710327_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129 - Project
- Vuln IDs
-
- V-242226
- V-17184
- Rule IDs
-
- SV-242226r961086_rule
- SV-33892
Checks: C-45501r710329_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and "winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45459r710330_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select "winproj.exe'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132 - Project
- Vuln IDs
-
- V-242227
- V-26587
- Rule IDs
-
- SV-242227r961089_rule
- SV-33915
Checks: C-45502r710332_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" must be set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45460r710333_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and 'winproj.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209 - Project
- Vuln IDs
-
- V-242228
- V-26585
- Rule IDs
-
- SV-242228r960921_rule
- SV-33903
Checks: C-45503r710335_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" must be set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45461r710336_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'winproj.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211 - Project
- Vuln IDs
-
- V-242229
- V-26586
- Rule IDs
-
- SV-242229r961779_rule
- SV-33907
Checks: C-45504r710338_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" must be set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45462r710339_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'winproj.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO346 - Project
- Vuln IDs
-
- V-242230
- V-26691
- Rule IDs
-
- SV-242230r961092_rule
- SV-34091
Checks: C-45505r710341_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Project 2010 -> Project Options -> Security "Enable untrusted intranet zone access to Project server" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\ms project\security Criteria: If the value TrustWSS is REG_DWORD = 0, this is not a finding.
Fix: F-45463r710342_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2010 -> Project Options -> Security "Enable untrusted intranet zone access to Project server" to "Disabled".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO999 - Project
- Vuln IDs
-
- V-265896
- Rule IDs
-
- SV-265896r999892_rule
Checks: C-69815r999890_chk
Microsoft Project 2010 is no longer supported by the vendor. If the system is running Microsoft Project 2010, this is a finding.
Fix: F-69719r999891_fix
Upgrade to a supported version.