STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2012/2012 R2 Member Server Security Technical Implementation Guide Version: 3 Release: 2 Benchmark Date: 04 May 2021:

Access to the Windows Store must be turned off.

DISA Rule

SV-225340r569185_rule

Vulnerability Number

V-225340

Group Title

SRG-OS-000095-GPOS-00049

Rule Version

WN12-CC-000030

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If the \Windows\WinStore directory exists, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off access to the Store" to "Enabled".

Alternately, uninstall the "Desktop Experience" feature from Windows 2012. This is located under "User Interfaces and Infrastructure" in the "Add Roles and Features Wizard". The \Windows\WinStore directory may need to be manually deleted after this.

Check Contents

The Windows Store is not installed by default. If the \Windows\WinStore directory does not exist, this is NA.

If the following registry value does not exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Explorer\

Value Name: NoUseStoreOpenWith

Type: REG_DWORD
Value: 1

Vulnerability Number

V-225340

Documentable

False

Rule Version

WN12-CC-000030

Severity Override Guidance

The Windows Store is not installed by default. If the \Windows\WinStore directory does not exist, this is NA.

If the following registry value does not exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\Windows\Explorer\

Value Name: NoUseStoreOpenWith

Type: REG_DWORD
Value: 1

Check Content Reference

M

Target Key

4214

Comments