STIGQter STIGQter: STIG Summary: Google Chrome Current Windows Security Technical Implementation Guide Version: 1 Release: 18 Benchmark Date: 24 Jan 2020: Firewall traversal from remote host must be disabled.

DISA Rule

SV-57545r4_rule

Vulnerability Number

V-44711

Group Title

DTBC0001 - Disable firewall traversal

Rule Version

DTBC-0001

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Windows group policy:
1. Open the group policy editor tool with gpedit.msc
2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Configure remote access options
Policy Name: Enable firewall traversal from remote access host
Policy State: Disabled
Policy Value: N/A

Check Contents

Universal method:
1. In the omnibox (address bar) type chrome://policy
2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding.

Windows registry:
1. Start regedit
2. Navigate to HKLM\Software\Policies\Google\Chrome\
3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.

Vulnerability Number

V-44711

Documentable

False

Rule Version

DTBC-0001

Severity Override Guidance

Universal method:
1. In the omnibox (address bar) type chrome://policy
2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding.

Windows registry:
1. Start regedit
2. Navigate to HKLM\Software\Policies\Google\Chrome\
3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.

Check Content Reference

M

Target Key

2591

Comments