DTOO124 - Scripted Window Security must be enforced.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the users' computers in some manner. Disabling or not configuring this setting allows unknown websites to:
-Create browser windows appearing to be from the local operating system.
-Draw active windows displaying outside of the viewable areas of the screen capturing keyboard input.
-Overlay parent windows with their own browser windows to hide important system information, choices, or prompts.

Solution

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security 'Scripted Window Security Restrictions' to 'Enabled' and place a check in the 'winproj.exe' check box.

See Also

https://iasecontent.disa.mil/stigs/zip/U_MS_Project_2013_V1R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-001695, CSCv6|3.1, Rule-ID|SV-53224r1_rule, STIG-ID|DTOO124, Vuln-ID|V-26588

Plugin: Windows

Control ID: 0268007108d9c8cb68cf1a0c36ebe458d1bcfba3bd7f700840da7ec09a622c7a