DTOO191 - ActiveX control initialization must be disabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

ActiveX controls can adversely affect a computer directly. In addition, malicious code can be used to compromise an ActiveX control and attack a computer. To indicate the safety of an ActiveX control, developers can denote them as Safe For Initialization (SFI). SFI indicates a control is safe to open and run, and it is not capable of causing a problem for any computer, regardless of whether it has persisted data values or not.
If a control is not marked SFI, it is possible the control could adversely affect a computer-or it could mean the developers did not test the control in all situations and are not sure whether it might be compromised in the future.
By default, if a control is marked SFI, the application loads the control in safe mode and uses persisted values (if any). If the control is not marked SFI, the application loads the control in unsafe mode with persisted values (if any), or uses the default (first-time initialization) settings. In both situations, the Message Bar informs users the controls have been disabled and prompts them to respond.

Solution

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings 'ActiveX Control Initialization' to 'Disabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_OfficeSystem_2013_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(2), CAT|II, CCI|CCI-002460, Rule-ID|SV-228557r508020_rule, STIG-ID|DTOO191, STIG-Legacy|SV-52728, STIG-Legacy|V-17547, Vuln-ID|V-228557

Plugin: Windows

Control ID: 2bf95303920380123b08e103d6a51cc83a74e49e934fe0cc6c7138f397222f2c