DTOO124 - Scripted Window Security must be enforced.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the users' computers in some manner. Disabling or not configuring this setting allows unknown websites to:
-Create browser windows appearing to be from the local operating system.
-Draw active windows displaying outside of the viewable areas of the screen capturing keyboard input.
-Overlay parent windows with their own browser windows to hide important system information, choices or prompts.

Solution

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security 'Scripted Window Security Restrictions' to 'Enabled' and place a check in the 'groove.exe' check box.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_OneDrive_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-001695, CSCv6|3.1, Rule-ID|SV-215533r569322_rule, STIG-ID|DTOO124, STIG-Legacy|SV-85933, STIG-Legacy|V-71309, Vuln-ID|V-215533

Plugin: Windows

Control ID: 858aab0f0b6c68c113edc1cab4f90e29547df9caa5d59bea65996a14d0cd6d83