Skip to content

Microsoft InfoPath 2010 STIG

Rules, Groups, and Values defined within the XCCDF Benchmark

  • All automatic loading from Trusted Locations must be disabled.

    Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of ...
    Rule Medium Severity
  • Email with InfoPath forms must be configured to show UI to recipients.

    Malicious users could send e-mail InfoPath forms with embedded Web beacons that can be used to track when recipients open the form and provide confirmation that recipients' e-mail addresses are val...
    Rule Medium Severity
  • Disabling email forms running in Restricted Security Level must be configured.

    InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious user could still send an e-mail form running with the restricted security l...
    Rule Medium Severity
  • Disabling of Fully Trusted Solutions access to computers must be configured.

    InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on ...
    Rule Medium Severity
  • Beaconing of UI forms with ActiveX controls must be enforced.

    InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a Web beacon into one o...
    Rule Medium Severity
  • Unsafe file types must be prevented from being attached to InfoPath forms.

    Users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath disallows by default...
    Rule Medium Severity
  • InfoPath must be enforced to not use e-mail forms from the Intranet security zone.

    InfoPath e-mail forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default, f...
    Rule Medium Severity
  • Disabling opening forms with managed code from the Internet security zone must be configured.

    When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and th...
    Rule Medium Severity
  • DTOO131 - Trust Bar Notifications

    Group
  • Trust Bar Notifications for unsigned application add-ins must be blocked.

    If an application is configured to require all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar a...
    Rule Medium Severity
  • DTOO133-Disable all trusted locations

    Group
  • DTOO157 - SharePoint Services Gradual Upgrade

    Group
  • Redirection behavior for upgraded web sites by SharePoint must be blocked.

    InfoPath automatically redirects user requests for sites that have not been upgraded to the temporary URL if it is located on the local intranet, but blocks them if the temporary URL is located els...
    Rule Medium Severity
  • DTOO167 - Forms Opening behavior - EMail /w code

    Group
  • Opening behavior for EMail forms containing code or scripts must be controlled.

    InfoPath notifies and prompts users before opening InfoPath e-mail forms that contain code or script. If this restriction is relaxed, InfoPath will open e-mail forms that contain code or script wit...
    Rule Medium Severity
  • DTOO176 - Email forms beaconing UI

    Group
  • DTOO169 - Disable dynamic caching / form template

    Group
  • Dynamic caching of InfoPath eMail forms must be disabled.

    InfoPath caches form templates when they are attached to a mail item recognized as an InfoPath e-mail form. When users fill out forms running with a restricted security level, InfoPath uses the cac...
    Rule Medium Severity
  • DTOO173 - E-Mail forms from Full Trust Zone

    Group
  • Disabling of email forms from the Full Trust Security Zone must be configured.

    InfoPath provides three security levels for form templates: Restricted, Domain, and Full Trust. The security levels determine whether a form template can access data on other domains, or access fil...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules