UCF STIG Viewer Logo

Scripted Window Security must be enforced.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26588 DTOO124 - PowerPoint SV-33804r1_rule Medium
Description
Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the users' computers in some manner. Disabling or not configuring this setting allows unknown websites to: -Create browser windows appearing to be from the local operating system. -Draw active windows displaying outside of the viewable areas of the screen capturing keyboard input. -Overlay parent windows with their own browser windows to hide important system information, choices or prompts.
STIG Date
Microsoft PowerPoint 2010 STIG 2018-04-05

Details

Check Text ( C-34178r1_chk )
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” must be set to “Enabled” and ‘powerpnt.exe’ and 'pptview.exe' are checked.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS

Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.

AND

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS

Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.

Fix Text (F-29867r1_fix)
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” to “Enabled” and ‘powerpnt.exe’ and 'pptview.exe' are checked.