UCF STIG Viewer Logo

MS SharePoint Designer 2013 Security Technical Implementation Guide


Overview

Date Finding Count (10)
2018-04-02 CAT I (High): 0 CAT II (Med): 10 CAT III (Low): 0
STIG Description
The Microsoft SharePointDesigner 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-40745 Medium The Internet Explorer Bind to Object functionality must be enabled.
V-40744 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-40747 Medium Navigation to URLs embedded in Office products must be blocked.
V-40746 Medium The Saved from URL mark must be selected to enforce Internet zone processing
V-40752 Medium Protection from zone elevation must be enforced.
V-40755 Medium ActiveX installs must be configured for proper restrictions.
V-40749 Medium Add-on Management functionality must be allowed.
V-40750 Medium Links that invoke instances of IE from within an Office product must be blocked.
V-40748 Medium Scripted Window Security must be enforced.
V-40751 Medium File downloads must be configured for proper restrictions.