Microsoft InfoPath 2010 STIG
Rules, Groups, and Values defined within the XCCDF Benchmark
-
All automatic loading from Trusted Locations must be disabled.
Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of ...Rule Medium Severity -
Email with InfoPath forms must be configured to show UI to recipients.
Malicious users could send e-mail InfoPath forms with embedded Web beacons that can be used to track when recipients open the form and provide confirmation that recipients' e-mail addresses are val...Rule Medium Severity -
Disabling email forms running in Restricted Security Level must be configured.
InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious user could still send an e-mail form running with the restricted security l...Rule Medium Severity -
Disabling of Fully Trusted Solutions access to computers must be configured.
InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on ...Rule Medium Severity -
Beaconing of UI forms with ActiveX controls must be enforced.
InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a Web beacon into one o...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules