Back

Configure the "internet explorer processes (mk protocol)" setting.


CONTROL ID
04347
CONTROL TYPE
Configuration
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Configure Internet Browser security options according to organizational standards., CC ID: 02166

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • This setting blocks the MK protocol, a protocol used by older Web applications to retrieve information from compressed files. The Internet Explorer Processes (MK Protocol) setting should be Enabled. (Pg 85, Microsoft Windows Vista Security Guide Appendix A: Security Group Policy Settings)
  • Title: Set 'MK Protocol Security Restriction' to 'Enabled' Description: The MK Protocol Security Restriction policy setting reduces attack surface area by preventing the MK protocol. Resources hosted on the MK protocol will fail. If you enable this policy setting, the MK Protocol is prevented fo… (Rule:xccdf_org.cisecurity.benchmarks_rule_7.5_Set_MK_Protocol_Security_Restriction_to_Enabled Artifact Expression:xccdf_org.cisecurity.benchmarks_ae_7.5.1_, The Center for Internet Security Microsoft Internet Explorer 10 Level 1 Benchmark, 1.0.0)
  • Title: Set 'MK Protocol Security Restriction' to 'Enabled' Description: The MK Protocol Security Restriction policy setting reduces attack surface area by preventing the MK protocol. Resources hosted on the MK protocol will fail. If you enable this policy setting, the MK Protocol is prevented fo… (Rule:xccdf_org.cisecurity.benchmarks_rule_7.5_Set_MK_Protocol_Security_Restriction_to_Enabled Artifact Expression:xccdf_org.cisecurity.benchmarks_ae_7.5.2_, The Center for Internet Security Microsoft Internet Explorer 10 Level 1 Benchmark, 1.0.0)
  • Title: Set 'MK Protocol Security Restriction' to 'Enabled' Description: The MK Protocol Security Restriction policy setting reduces attack surface area by preventing the MK protocol. Resources hosted on the MK protocol will fail. If you enable this policy setting, the MK Protocol is prevented fo… (Rule:xccdf_org.cisecurity.benchmarks_rule_7.5_Set_MK_Protocol_Security_Restriction_to_Enabled Artifact Expression:xccdf_org.cisecurity.benchmarks_ae_7.5.3_, The Center for Internet Security Microsoft Internet Explorer 10 Level 1 Benchmark, 1.0.0)
  • Title: Set 'MK Protocol Security Restriction' to 'Enabled' Description: The MK Protocol Security Restriction policy setting reduces attack surface area by preventing the MK protocol. Resources hosted on the MK protocol will fail. If you enable this policy setting, the MK Protocol is prevented fo… (Rule:xccdf_org.cisecurity.benchmarks_rule_7.5_Set_MK_Protocol_Security_Restriction_to_Enabled Artifact Expression:xccdf_org.cisecurity.benchmarks_ae_7.5.4_, The Center for Internet Security Microsoft Internet Explorer 10 Level 1 Benchmark, 1.0.0)
  • The "Internet Explorer Processes (MK Protocol)" setting should be configured correctly. Technical Mechanisms: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL\(Reserved) HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE… (CCE-3338-1, Common Configuration Enumeration List, Combined XML: Internet Explorer 7, 5.20130214)
  • The "MK Protocol Security Restriction: Internet Explorer Processes" machine setting should be configured correctly. Technical Mechanisms: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\MK Protocol Security Restriction\Internet Explore… (CCE-10265-7, Common Configuration Enumeration List, Combined XML: Microsoft Internet Explorer 8, 5.20130214)
  • The "MK Protocol Security Restriction: Process List" current user setting should be configured correctly. Technical Mechanisms: User Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\MK Protocol Security Restriction\Process List HKEY_CURRENT_USER\Software… (CCE-16061-4, Common Configuration Enumeration List, Combined XML: Microsoft Internet Explorer 8, 5.20130214)
  • The "MK Protocol Security Restriction: All Processes" current user setting should be configured correctly. Technical Mechanisms: User Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\MK Protocol Security Restriction\All Processes HKEY_CURRENT_USER\Softwa… (CCE-16982-1, Common Configuration Enumeration List, Combined XML: Microsoft Internet Explorer 8, 5.20130214)
  • The "MK Protocol Security Restriction: Internet Explorer Processes" current user setting should be configured correctly. Technical Mechanisms: User Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\MK Protocol Security Restriction\Internet Explorer Proces… (CCE-16938-3, Common Configuration Enumeration List, Combined XML: Microsoft Internet Explorer 8, 5.20130214)
  • The "MK Protocol Security Restriction: Process List" machine setting should be configured correctly. Technical Mechanisms: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\MK Protocol Security Restriction\Process List HKEY_LOCAL_MACHINE\Software… (CCE-17005-0, Common Configuration Enumeration List, Combined XML: Microsoft Internet Explorer 8, 5.20130214)
  • The "MK Protocol Security Restriction: All Processes" machine setting should be configured correctly. Technical Mechanisms: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\MK Protocol Security Restriction\All Processes HKEY_LOCAL_MACHINE\Softwa… (CCE-16763-5, Common Configuration Enumeration List, Combined XML: Microsoft Internet Explorer 8, 5.20130214)
  • Internet Explorer Processes - MK Protocol Security Restriction - Local Computer (IEProcesses_MKProtocolSecurityRestriction_LocalComputer, NIST SCAP Microsoft Internet Explorer Version 7 (fdcc-ie7-xccdf.xml), FDCC IE7 (1.2) SCAP Content - OVAL 5.4)
  • The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. (xccdf_gov.nist_rule_IEProcesses_MKProtocolSecurityRestriction_LocalComputer, oval:gov.nist.USGCB.ie7:def:617, oval:gov.nist.USGCB.ie7:tst:3453, oval:gov.nist.USGCB.ie7:obj:72, oval:gov.nist.USGCB.ie7:ste:3114, USGCB: Guidance for Securing Microsoft Internet Explorer 7, v1.2.3.1)
  • The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. (xccdf_gov.nist_rule_IEProcesses_MKProtocolSecurityRestriction_LocalComputer, oval:gov.nist.USGCB.ie7:def:617, oval:gov.nist.USGCB.ie7:tst:3843, oval:gov.nist.USGCB.ie7:obj:134, oval:gov.nist.USGCB.ie7:ste:3527, USGCB: Guidance for Securing Microsoft Internet Explorer 7, v1.2.3.1)
  • The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. (xccdf_gov.nist_rule_IEProcesses_MKProtocolSecurityRestriction_LocalComputer, oval:gov.nist.USGCB.ie7:def:617, oval:gov.nist.USGCB.ie7:tst:4037, oval:gov.nist.USGCB.ie7:obj:103, oval:gov.nist.USGCB.ie7:ste:3719, USGCB: Guidance for Securing Microsoft Internet Explorer 7, v1.2.3.1)
  • The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. (xccdf_gov.nist_rule_IEProcesses_MKProtocolSecurityRestriction_LocalComputer, oval:gov.nist.USGCB.ie8:def:31089, oval:gov.nist.USGCB.ie8:tst:31089, oval:gov.nist.USGCB.ie8:obj:31089, oval:gov.nist.USGCB.ie8:ste:31089, USGCB: Guidance for Securing Microsoft Internet Explorer 8, v1.2.3.1)
  • The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. (xccdf_gov.nist_rule_IEProcesses_MKProtocolSecurityRestriction_LocalComputer, oval:gov.nist.USGCB.ie8:def:31089, oval:gov.nist.USGCB.ie8:tst:31118, oval:gov.nist.USGCB.ie8:obj:31118, oval:gov.nist.USGCB.ie8:ste:31118, USGCB: Guidance for Securing Microsoft Internet Explorer 8, v1.2.3.1)
  • The MK Protocol Security Restriction policy setting reduces attack surface area by blocking the seldom used MK protocol. Some older Web applications use the MK protocol to retrieve information from compressed files. (xccdf_gov.nist_rule_IEProcesses_MKProtocolSecurityRestriction_LocalComputer, oval:gov.nist.USGCB.ie8:def:31089, oval:gov.nist.USGCB.ie8:tst:31119, oval:gov.nist.USGCB.ie8:obj:31119, oval:gov.nist.USGCB.ie8:ste:31119, USGCB: Guidance for Securing Microsoft Internet Explorer 8, v1.2.3.1)
  • This setting blocks the MK protocol, a protocol used by older Web applications to retrieve information from compressed files. The Internet Explorer Processes (MK Protocol) setting should be Enabled. (Pg 92, NSA Guide to Security Microsoft Windows XP)