Microsoft SharePoint Designer 2013 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 10 rules matched cleanly.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO104
- Vuln IDs
-
- V-40744
- Rule IDs
-
- SV-52802r1_rule
Checks: C-47131r2_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" must be "Enabled" and a check in the 'spdesign.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45728r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'spdesign.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO111
- Vuln IDs
-
- V-40745
- Rule IDs
-
- SV-52803r1_rule
Checks: C-47132r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the 'spdesign.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45729r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'spdesign.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO117
- Vuln IDs
-
- V-40746
- Rule IDs
-
- SV-52804r1_rule
Checks: C-47133r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the 'spdesign.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45730r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'spdesign.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO123
- Vuln IDs
-
- V-40747
- Rule IDs
-
- SV-52805r1_rule
Checks: C-47134r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the 'spdesign.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45731r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'spdesign.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO124
- Vuln IDs
-
- V-40748
- Rule IDs
-
- SV-52806r1_rule
Checks: C-47135r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'spdesign.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45732r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'spdesign.exe' is checked.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO126
- Vuln IDs
-
- V-40749
- Rule IDs
-
- SV-52807r1_rule
Checks: C-47136r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'spdesign.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45733r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and 'spdesign.exe' is checked.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO129
- Vuln IDs
-
- V-40750
- Rule IDs
-
- SV-52808r1_rule
Checks: C-47137r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and 'spdesign.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45734r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select 'spdesign.exe'.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO132
- Vuln IDs
-
- V-40751
- Rule IDs
-
- SV-52809r1_rule
Checks: C-47138r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'spdesign.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45735r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and 'spdesign.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209
- Vuln IDs
-
- V-40752
- Rule IDs
-
- SV-52810r1_rule
Checks: C-47139r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'spdesign.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45736r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'spdesign.exe' is checked.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO211
- Vuln IDs
-
- V-40755
- Rule IDs
-
- SV-52813r1_rule
Checks: C-47140r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'spdesign.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45739r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'spdesign.exe' is checked.