STIGQter STIGQter: STIG Summary: Microsoft Access 2013 STIG Version: 1 Release: 6 Benchmark Date: 27 Apr 2018:

Links that invoke instances of Internet Explorer from within an Office product must be blocked.

DISA Rule

SV-52767r1_rule

Vulnerability Number

V-17184

Group Title

DTOO129 - Block Pop-Ups

Rule Version

DTOO129

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select 'msaccess.exe'.

Check Contents

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'msaccess.exe' is checked.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT

Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.

Vulnerability Number

V-17184

Documentable

False

Rule Version

DTOO129

Severity Override Guidance

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'msaccess.exe' is checked.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT

Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

2477

Comments