STIGQter STIGQter: STIG Summary: Microsoft Word 2010 STIG Version: 1 Release: 11 Benchmark Date: 27 Apr 2018:

File Downloads must be configured for proper restrictions.

DISA Rule

SV-33801r1_rule

Vulnerability Number

V-26587

Group Title

DTOO132 - Restrict File Download

Rule Version

DTOO132 - Word

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” to “Enabled” and 'winword.exe' is checked.

Check Contents

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” must be set to “Enabled” and 'winword.exe' is checked.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD

Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.

Vulnerability Number

V-26587

Documentable

False

Rule Version

DTOO132 - Word

Severity Override Guidance

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” must be set to “Enabled” and 'winword.exe' is checked.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD

Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

2028

Comments