Skip to content

Microsoft InfoPath 2010 STIG

Rules, Groups, and Values defined within the XCCDF Benchmark

  • All automatic loading from Trusted Locations must be disabled.

    Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of ...
    Rule Medium Severity
  • Email with InfoPath forms must be configured to show UI to recipients.

    Malicious users could send e-mail InfoPath forms with embedded Web beacons that can be used to track when recipients open the form and provide confirmation that recipients' e-mail addresses are val...
    Rule Medium Severity
  • Disabling email forms running in Restricted Security Level must be configured.

    InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious user could still send an e-mail form running with the restricted security l...
    Rule Medium Severity
  • Disabling of Fully Trusted Solutions access to computers must be configured.

    InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on ...
    Rule Medium Severity
  • Beaconing of UI forms with ActiveX controls must be enforced.

    InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a Web beacon into one o...
    Rule Medium Severity
  • Unsafe file types must be prevented from being attached to InfoPath forms.

    Users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath disallows by default...
    Rule Medium Severity
  • InfoPath must be enforced to not use e-mail forms from the Intranet security zone.

    InfoPath e-mail forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default, f...
    Rule Medium Severity
  • Disabling opening forms with managed code from the Internet security zone must be configured.

    When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and th...
    Rule Medium Severity
  • DTOO131 - Trust Bar Notifications

    Group
  • Trust Bar Notifications for unsigned application add-ins must be blocked.

    If an application is configured to require all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar a...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules