STIGQter STIGQter: STIG Summary: MS SharePoint Designer 2013 Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 27 Apr 2018:

Navigation to URLs embedded in Office products must be blocked.

DISA Rule

SV-52805r1_rule

Vulnerability Number

V-40747

Group Title

DTOO123 - Block Navigation to URL from Office

Rule Version

DTOO123

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'spdesign.exe' check box.

Check Contents

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the 'spdesign.exe' check box must be present.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL

Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.

Vulnerability Number

V-40747

Documentable

False

Rule Version

DTOO123

Severity Override Guidance

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the 'spdesign.exe' check box must be present.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL

Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

2552

Comments