III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000141
Group -
Internet Explorer Processes for restricting pop-up windows must be enforced (Explorer).
Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable websites will resize windows to either hide other windows or force a ...Rule Medium Severity -
SRG-APP-000141
Group -
Internet Explorer Processes for restricting pop-up windows must be enforced (iexplore).
Internet Explorer allows scripts to programmatically open, resize, and reposition various types of windows. Often, disreputable websites will resize windows to either hide other windows or force a ...Rule Medium Severity -
SRG-APP-000516
Group -
.NET Framework-reliant components not signed with Authenticode must be disallowed to run (Restricted Sites Zone).
This policy setting allows you to manage whether .NET Framework-reliant components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed con...Rule Medium Severity -
SRG-APP-000516
Group -
.NET Framework-reliant components signed with Authenticode must be disallowed to run (Restricted Sites Zone).
This policy setting allows you to manage whether .NET Framework-reliant components that are signed with Authenticode can be executed from Internet Explorer. It may be possible for malicious content...Rule Medium Severity -
SRG-APP-000141
Group -
Scripting of Java applets must be disallowed (Restricted Sites zone).
This policy setting allows you to manage whether applets are exposed to scripts within the zone. If you enable this policy setting, scripts can access applets automatically without user interventio...Rule Medium Severity -
SRG-APP-000141
Group -
AutoComplete feature for forms must be disallowed.
This AutoComplete feature suggests possible matches when users are filling in forms. It is possible that this feature will cache sensitive data and store it in the user's profile, where it might no...Rule Medium Severity -
SRG-APP-000141
Group -
Crash Detection management must be enforced.
The 'Turn off Crash Detection' policy setting allows you to manage the crash detection feature of add-on management in Internet Explorer. A crash report could contain sensitive information from the...Rule Medium Severity -
SRG-APP-000141
Group -
Turn on the auto-complete feature for user names and passwords on forms must be disabled.
This policy setting controls automatic completion of fields in forms on web pages. It is possible that malware could be developed which would be able to extract the cached user names and passwords ...Rule Medium Severity -
SRG-APP-000206
Group -
Managing SmartScreen Filter use must be enforced.
This setting is important from a security perspective because Microsoft has extensive data illustrating the positive impact the SmartScreen filter has had on reducing the risk of malware infection ...Rule Medium Severity -
SRG-APP-000089
Group -
Browser must retain history on exit.
Delete Browsing History on exit automatically deletes specified items when the last browser window closes. Disabling this function will prevent users from deleting their browsing history, which co...Rule Medium Severity -
SRG-APP-000089
Group -
Deleting websites that the user has visited must be disallowed.
This policy prevents users from deleting the history of websites the user has visited. If you enable this policy setting, websites the user has visited will be preserved when the user clicks "Delet...Rule Medium Severity -
SRG-APP-000080
Group -
InPrivate Browsing must be disallowed.
InPrivate Browsing lets the user control whether or not Internet Explorer saves the browsing history, cookies, and other data. User control of settings is not the preferred control method. The InPr...Rule Medium Severity -
SRG-APP-000141
Group -
Scripting of Internet Explorer WebBrowser control property must be disallowed (Internet zone).
This policy setting controls whether a page may control embedded WebBrowser control via script. Scripted code hosted on sites located in this zone is more likely to contain malicious code. If you e...Rule Medium Severity -
SRG-APP-000141
Group -
When uploading files to a server, the local directory path must be excluded (Internet zone).
This policy setting controls whether or not the local path information will be sent when uploading a file via a HTML form. If the local path information is sent, some information may be unintention...Rule Medium Severity -
SRG-APP-000141
Group -
Internet Explorer Processes for Notification Bars must be enforced (Reserved).
This policy setting allows you to manage whether the Notification Bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Notification Bar is dis...Rule Medium Severity -
SRG-APP-000516
Group -
Security Warning for unsafe files must be set to prompt (Internet zone).
This policy setting controls whether or not the 'Open File - Security Warning' message appears when the user tries to open executable files or other potentially unsafe files (from an intranet file ...Rule Medium Severity -
SRG-APP-000141
Group -
Internet Explorer Processes for Notification Bars must be enforced (Explorer).
This policy setting allows you to manage whether the Notification Bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Notification Bar is dis...Rule Medium Severity -
SRG-APP-000210
Group -
ActiveX controls without prompt property must be used in approved domains only (Internet zone).
This policy setting controls whether or not the user is prompted to allow ActiveX controls to run on websites other than the website that installed the ActiveX control. If the user were to disable ...Rule Medium Severity -
SRG-APP-000141
Group -
Internet Explorer Processes for Notification Bars must be enforced (iexplore).
This policy setting allows you to manage whether the Notification Bar is displayed for Internet Explorer processes when file or code installs are restricted. By default, the Notification Bar is dis...Rule Medium Severity -
SRG-APP-000141
Group -
Cross-Site Scripting Filter must be enforced (Internet zone).
The Cross-Site Scripting Filter is designed to prevent users from becoming victims of unintentional information disclosure. This setting controls if the Cross-Site Scripting (XSS) Filter detects an...Rule Medium Severity -
SRG-APP-000141
Group -
Scripting of Internet Explorer WebBrowser Control must be disallowed (Restricted Sites zone).
This policy setting controls whether a page may control embedded WebBrowser Control via script. Scripted code hosted on sites located in this zone is more likely to contain malicious code. If you e...Rule Medium Severity -
SRG-APP-000141
Group -
When uploading files to a server, the local directory path must be excluded (Restricted Sites zone).
This policy setting controls whether or not the local path information will be sent when uploading a file via a HTML form. If the local path information is sent, some information may be unintention...Rule Medium Severity -
SRG-APP-000516
Group -
Security Warning for unsafe files must be disallowed (Restricted Sites zone).
This policy setting controls whether or not the 'Open File - Security Warning' message appears when the user tries to open executable files or other potentially unsafe files (from an intranet file ...Rule Medium Severity -
SRG-APP-000210
Group -
ActiveX controls without prompt property must be used in approved domains only (Restricted Sites zone).
This policy setting controls whether or not the user is prompted to allow ActiveX controls to run on websites other than the website that installed the ActiveX control. If the user were to disable ...Rule Medium Severity -
SRG-APP-000141
Group -
Cross-Site Scripting Filter property must be enforced (Restricted Sites zone).
The Cross-Site Scripting Filter is designed to prevent users from becoming victims of unintentional information disclosure. This setting controls if the Cross-Site Scripting (XSS) Filter detects an...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.