STIGQter STIGQter: STIG Summary: Microsoft Outlook 2010 STIG Version: 1 Release: 13 Benchmark Date: 27 Apr 2018:

Disable user name and password syntax from being used in URLs

DISA Rule

SV-75853r1_rule

Vulnerability Number

V-17173

Group Title

DTOO104 - Disable user name and password

Rule Version

DTOO104 - Outlook

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2010 (Machine) >> Security Settings >> IE Security “Disable user name and password” to “Enabled” and place a check in the ”outlook.exe” check box.

Click "Apply".

Check Contents

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2010 (Machine) >> Security Settings >> IE Security “Disable user name and password” must be “Enabled” and a check in the ”outlook.exe” check box must be present.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE

Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.

Vulnerability Number

V-17173

Documentable

False

Rule Version

DTOO104 - Outlook

Severity Override Guidance

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2010 (Machine) >> Security Settings >> IE Security “Disable user name and password” must be “Enabled” and a check in the ”outlook.exe” check box must be present.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE

Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

2024

Comments