Check: DTOO132 - Word
Microsoft Word 2010 STIG:
DTOO132 - Word
(in version v1 r2)
Title
File Downloads must be configured for proper restrictions. (Cat II impact)
Discussion
Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferences may also allow the download to occur without prompting or interacting with the user. Even if Internet Explorer prompts the user to accept the download, some websites abuse this functionality. Malicious websites may continually prompt users to download a file or present confusing dialog boxes to trick users into downloading or running a file. If the download occurs and it contains malicious code, the code could become active on user computers or the network.
Check Content
Fix Text
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” to “Enabled” and 'winword.exe' is checked.
Additional Identifiers
Rule ID: SV-33801r1_rule
Vulnerability ID: V-26587
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |