DTOO123 - Excel - Block navigation to URL embedded in Office products to protect against attack by malformed URL. - Policies

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). If Internet Explorer attempts to load a malformed URL, a security risk could occur in some cases.

Solution

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security 'Navigate URL' will be set to 'Enabled' and excel.exe is checked.

See Also

http://iase.disa.mil/stigs/app_security/office_auto/u_microsoft_office2007_v4r9_stig_20121026.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CSCv6|3.1, Rule-ID|SV-18207r2_rule, STIG-ID|DTOO123, Vuln-ID|V-17183

Plugin: Windows

Control ID: 883e4a7d9de82ced3add646d1e03a29b6d2a221e62b8f869409f76581e45728b