Scripted Window Security must be enforced.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-40748DTOO124SV-52806r1_ruleCCI-001695medium
Description
Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the users' computers in some manner. Disabling or not configuring this setting allows unknown websites to: -Create browser windows appearing to be from the local operating system. -Draw active windows displaying outside of the viewable areas of the screen capturing keyboard input. -Overlay parent windows with their own browser windows to hide important system information, choices or prompts.
STIGDate
MS SharePoint Designer 2013 Security Technical Implementation Guide2018-04-02

Details

Check Text (C-52806r1_chk)

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'spdesign.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value spdesign.exe is REG_DWORD = 1, this is not a finding.

Fix Text (F-45732r1_fix)

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'spdesign.exe' is checked.