DTBI136-IE11 - Logon options must be configured and enforced (Restricted Sites zone).

Information

Users could submit credentials to servers operated by malicious individuals who could then attempt to connect to legitimate servers with those captured credentials. Care must be taken with user credentials, automatic logon performance, and how default Windows credentials are passed to the websites. This policy setting allows management of settings for logon options. If you enable this policy setting, you can choose from varying logon options. 'Anonymous logon' disables HTTP authentication and uses the guest account only for the Common Internet File System (CIFS) protocol. 'Prompt for user name and password' queries users for user IDs and passwords. After a user is queried, these values can be used silently for the remainder of the session. 'Automatic logon only in Intranet zone' queries users for user IDs and passwords in other zones. After a user is queried, these values can be used silently for the remainder of the session. 'Automatic logon with current user name and password' attempts logon using Windows NT Challenge Response. If Windows NT Challenge Response is supported by the server, the logon uses the user's network user name and password for login. If Windows NT Challenge Response is not supported by the server, the user is queried to provide the user name and password. If you disable this policy setting, logon is set to 'Automatic logon only in Intranet zone'. If you do not configure this policy setting, logon is set to 'Automatic logon only in Intranet zone'. The most secure option is to configure this setting to 'Enabled'; 'Anonymous logon'. This will prevent users from submitting credentials to servers in this security zone.

Solution

Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page -> Restricted Sites Zone -> 'Logon options' to 'Enabled', and select 'Anonymous logon' from the drop-down box.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IE11_V2R5_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-23, CAT|II, CCI|CCI-001184, Rule-ID|SV-223070r879636_rule, STIG-ID|DTBI136-IE11, STIG-Legacy|SV-59471, STIG-Legacy|V-46607, Vuln-ID|V-223070

Plugin: Windows

Control ID: 615e4461c1d8896d8d238f0587def99864bc1737d01a04fddb6bb864c3e86073