STIGQter STIGQter: STIG Summary: Microsoft OneNote 2016 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 19 Jan 2017:

Disabling of user name and password syntax from being used in URLs must be enforced.

DISA Rule

SV-85453r2_rule

Vulnerability Number

V-70829

Group Title

SRG-APP-000210

Rule Version

DTOO104

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'onent.exe' check box.

Check Contents

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'onent.exe' is checked.

Procedure: Use the Windows Registry Editor to navigate to the following key:
HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE

Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.

Vulnerability Number

V-70829

Documentable

False

Rule Version

DTOO104

Severity Override Guidance

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'onent.exe' is checked.

Procedure: Use the Windows Registry Editor to navigate to the following key:
HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE

Criteria: If the value onenote.exe is REG_DWORD = 1, this is not a finding.

Check Content Reference

M

Target Key

3115

Comments