Check: DTOO606
Microsoft OneDrive STIG:
DTOO606
(in version v2 r1)
Title
Exploit Protection mitigations in Windows 10 must be configured for OneDrive.exe. (Cat II impact)
Discussion
Exploit protection in Windows 10 provides a means of enabling additional mitigations against potential threats at the system and application level. Without these additional application protections, Windows 10 may be subject to various exploits.
Check Content
This is NA prior to v1709 of Windows 10. This is applicable to unclassified systems. For other systems, this is NA. Run "Windows PowerShell" with elevated privileges (run as administrator). Enter "Get-ProcessMitigation -Name OneDrive.exe". (Get-ProcessMitigation can be run without the -Name parameter to get a list of all application mitigations configured.) If the following mitigations do not have the listed status shown below, this is a finding: DEP: Override DEP: False ASLR: ForceRelocateImages: NOTSET ImageLoad: OverrideBlockRemoteImages: False Payload: OverrideExportAddressFilter: False OverrideExportAddressFilterPlus: False OverrideImportAddressFilter: False OverrideEnableRopStackPivot: False OverrideEnableRopCallerCheck: False OverrideEnableRopSimExec: False The PowerShell command produces a list of mitigations; only those with a required status are listed here. If the PowerShell command does not produce results, ensure the letter case of the filename within the command syntax matches the letter case of the actual filename on the system.
Fix Text
Ensure the following mitigations are configured for OneDrive.exe: DEP: Override DEP: False ASLR: ForceRelocateImages: NOTSET ImageLoad: OverrideBlockRemoteImages: False Payload: OverrideExportAddressFilter: False OverrideExportAddressFilterPlus: False OverrideImportAddressFilter: False OverrideEnableRopStackPivot: False OverrideEnableRopCallerCheck: False OverrideEnableRopSimExec: False Application mitigations defined in the STIG are configured by a DoD EP XML file included with the Windows 10 STIG package in the "Supporting Files" folder. The XML file is applied with the group policy setting Computer Configuration >> Administrative Settings >> Windows Components >> Windows Defender Exploit Guard >> Exploit Protection >> "Use a common set of exploit protection settings" configured to "Enabled" with file name and location defined under "Options:". It is recommended the file be in a read-only network location.
Additional Identifiers
Rule ID: SV-230563r569322_rule
Vulnerability ID: V-230563
Group Title: SRG-APP-000516
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |