DTOO606 - Exploit Protection mitigations in Windows 10 must be configured for OneDrive.exe - ForceRelocateImages

Information

Exploit protection in Windows 10 provides a means of enabling additional mitigations against potential threats at the system and application level. Without these additional application protections, Windows 10 may be subject to various exploits.

Solution

Ensure the following mitigations are configured for OneDrive.exe:

DEP:
Override DEP: False

ASLR:
ForceRelocateImages: NOTSET

ImageLoad:
OverrideBlockRemoteImages: False

Payload:
OverrideExportAddressFilter: False
OverrideExportAddressFilterPlus: False
OverrideImportAddressFilter: False
OverrideEnableRopStackPivot: False
OverrideEnableRopCallerCheck: False
OverrideEnableRopSimExec: False

Application mitigations defined in the STIG are configured by a DoD EP XML file included with the Windows 10 STIG package in the 'Supporting Files' folder.

The XML file is applied with the group policy setting Computer Configuration >> Administrative Settings >> Windows Components >> Windows Defender Exploit Guard >> Exploit Protection >> 'Use a common set of exploit protection settings' configured to 'Enabled' with file name and location defined under 'Options:'. It is recommended the file be in a read-only network location.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_OneDrive_V2R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-230563r569322_rule, STIG-ID|DTOO606, STIG-Legacy|SV-91931, STIG-Legacy|V-77235, Vuln-ID|V-230563

Plugin: Windows

Control ID: 0c102e721feaa4289c867e50b4a630b79b38f9e49087445dbb9620fe01db0c22