Check: DTOO211 - Word
Microsoft Word 2010 STIG:
DTOO211 - Word
(in versions v1 r11 through v1 r10)
Title
ActiveX Installs must be configured for proper restriction. (Cat II impact)
Discussion
Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in the browser like the other types of HTML or Microsoft Silverlight-based controls. Disabling or not configuring this setting does not block prompts for ActiveX control installations and these prompts display to users. This could allow malicious code to become active on user computers or the network.
Check Content
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” must be set to “Enabled” and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” to “Enabled” and 'winword.exe' is checked.
Additional Identifiers
Rule ID: SV-33795r1_rule
Vulnerability ID: V-26586
Group Title: DTOO211 - Restrict ActiveX Install
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002460 |
The information system enforces organization-defined actions prior to executing mobile code. |
Controls
Number | Title |
---|---|
SC-18 (4) |
Prevent Automatic Execution |