DTOO124 - Scripted Window Security must be enforced.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the users' computers in some manner. Disabling or not configuring this setting allows unknown websites to:
-Create browser windows appearing to be from the local operating system.
-Draw active windows displaying outside of the viewable areas of the screen capturing keyboard input.
-Overlay parent windows with their own browser windows to hide important system information, choices or prompts.falseSystem AdministratorInformation Assurance Officer

Solution

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security 'Scripted Window Security Restrictions' to 'Enabled' and 'winword.exe' is checked.

See Also

https://iasecontent.disa.mil/stigs/zip/U_MS_Word_2013_V1R6_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-001695, CSCv6|3.1, Rule-ID|SV-53562r1_rule, STIG-ID|DTOO124, Vuln-ID|V-26588

Plugin: Windows

Control ID: 5629ffb7408cb71eb8dfd9cae25b7d68f875407caddc5b0c82085870fd3cb498