diff --git a/CHANGELOG.md b/CHANGELOG.md index 6b8428d0..4f604482 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -17,9 +17,11 @@ * Update Powerstig to parse\apply Microsoft Windows 10 STIG - Ver 3, Rel 1 [#1366](https://github.com/microsoft/PowerStig/issues/1366) +* Update Powerstig to parse/apply Microsoft Edge STIG - Ver 2, Rel 1 [#1364](https://github.com/microsoft/PowerStig/issues/1350) + ## [4.22.0] - 2024-05-31 -* Update Powerstig to parse/apply Microsoft Edge STIG - Ver 1, Rel 8 [#1350](https://github.com/microsoft/PowerStig/issues/1350) +* Update Powerstig to parse/apply Microsoft Edge STIG - Ver 1, Rel 8 [#1350](https://github.com/microsoft/PowerStig/issues/1364) * Update PowerSTIG to Parse/Apply Microsoft Windows 11 STIG - Ver 1, Rel 6 [#1341](https://github.com/microsoft/PowerStig/issues/1341) * Update PowerSTIG to Parse/Apply Microsoft Windows 10 STIG - Ver 2, Rel 9 [#1342](https://github.com/microsoft/PowerStig/issues/1342) * Update PowerSTIG to Parse/Apply Microsoft Windows Server 2016 STIG - Ver 2, Rel 8 [#1340](https://github.com/microsoft/PowerStig/issues/1340) diff --git a/FILEHASH.md b/FILEHASH.md index 4393eb7f..792c4893 100644 --- a/FILEHASH.md +++ b/FILEHASH.md @@ -44,8 +44,8 @@ Hashes for **PowerSTIG** files are listed in the following table: | InternetExplorer-11-2.5.xml | C9F83548B41374FDEC86DC274B5BF0CD756C9968C04E0DF5880BF298ED22F3E2 | 331506 | | McAfee-8.8-VirusScan-5.16.org.default.xml | 28792D63E69F797CA02CCAE52F537B1001D9069BD7DE4F5A73375424C19FE660 | 777 | | McAfee-8.8-VirusScan-5.16.xml | 22CAEE788CA69690819D46548D19E40163FD8EB799F8EC7FAA4E5FB714C4F445 | 244268 | -| MS-Edge-1.7.org.default.xml | C9F9FB4395B3D2FED0F2C37742396488167CC7D1E76DADE7943A2095270FEDC9 | 1057 | -| MS-Edge-1.7.xml | 4B4FCE687416445ABFAF7D2FB4603D62867743664D92F721E3D77ADB11442FE2 | 115718 | +| MS-Edge-2.1.org.default.xml | C9F9FB4395B3D2FED0F2C37742396488167CC7D1E76DADE7943A2095270FEDC9 | 1057 | +| MS-Edge-2.1.xml | 4B4FCE687416445ABFAF7D2FB4603D62867743664D92F721E3D77ADB11442FE2 | 115718 | | MS-Edge-1.8.org.default.xml | 855E51BA09F4ABDEC200555443B2ADD2922FD71F207059E2F1AB11A524950A1D | 1057 | | MS-Edge-1.8.xml | A11903B541EDF5BD28569E9E1914DAE6B9FAFFFBF99BA775DD8A0435E9DF9872 | 121220 | | Office-365ProPlus-2.11.org.default.xml | D0F16611A925DC87CEEE57410763DBCA63AEB23B1AD041A697146BD306EFD3A3 | 2451 | @@ -106,8 +106,8 @@ Hashes for **PowerSTIG** files are listed in the following table: | SqlServer-2012-Instance-1.19.xml | 1313489DECFD7B137F53C9A55DA8068075CDD8015DBE24AEC77CC4276D910185 | 725272 | | SqlServer-2012-Instance-1.20.org.default.xml | BB9345EFCFBDB1FDCF731620B233BBD6B1CFD8856A25422D753D9D668D850860 | 1098 | | SqlServer-2012-Instance-1.20.xml | 6E8F27FE02ACF7877AB36F90F8C2CADCD8A93A3500288D41EF06070E7C992C66 | 717809 | -| SqlServer-2016-Instance-2.11.org.default.xml | 2DBF44494DE10F1FA437CA86ED5BB46B4B4D2580F214DA1BF311937CF43B425B | 624 | -| SqlServer-2016-Instance-2.11.xml | 4EBF10C32E91ABFE37E68E68939C684A03536C8D521B96E499A210FF3B6A1F19 | 471144 | +| SqlServer-2016-Instance-3.1.org.default.xml | 2DBF44494DE10F1FA437CA86ED5BB46B4B4D2580F214DA1BF311937CF43B425B | 624 | +| SqlServer-2016-Instance-3.1.xml | 4EBF10C32E91ABFE37E68E68939C684A03536C8D521B96E499A210FF3B6A1F19 | 471144 | | SqlServer-2016-Instance-2.12.org.default.xml | 000912E234F2FB69307CEDA322588043A8DDAC796D6AEBA89A3F483E5D2A9958 | 617 | | SqlServer-2016-Instance-2.12.xml | 3855233D9EB5BDE3189D5A476C06D030F61C2F94FCF28FEF7B9B63B4CE03168B | 472461 | | Ubuntu-18.04-2.13.org.default.xml | 00C159706325AE5539AD725A5CA9E303FE04E5C9CE458E9DE676C7468BDFBA56 | 6921 | @@ -118,8 +118,8 @@ Hashes for **PowerSTIG** files are listed in the following table: | Vsphere-6.5-2.2.xml | E3A2F2D4C89416D14A8F3AB4DC6A5444DEA9683AFB2A21A653749995F289AD24 | 144122 | | Vsphere-6.5-2.3.org.default.xml | B8539D6118706486E3F451AC2466FE5BABC1C9DB30C1A48C80D3FFA32354056E | 797 | | Vsphere-6.5-2.3.xml | DE07939A8EC08F52E77FF411FF04359FCE02035C5038B70FBA2ADC42B994BEAA | 146293 | -| WindowsClient-10-2.8.org.default.xml | D6B2BE56A048DAA4088F4B5DF411536634665ACA12714075243E4BD4367405B1 | 5942 | -| WindowsClient-10-2.8.xml | 3719ECFCFFE9B00DA8943660F8036A818875F74B344B8D3C2A60C6ED665A7867 | 545651 | +| WindowsClient-10-3.1.org.default.xml | D6B2BE56A048DAA4088F4B5DF411536634665ACA12714075243E4BD4367405B1 | 5942 | +| WindowsClient-10-3.1.xml | 3719ECFCFFE9B00DA8943660F8036A818875F74B344B8D3C2A60C6ED665A7867 | 545651 | | WindowsClient-10-2.9.org.default.xml | 7864F653B324A5B71EAE976EB6B74ACFEBEAFB4EC0BDBDC3D266AD6A9EFC8BC9 | 5942 | | WindowsClient-10-2.9.xml | 075671F5E0C6F3D8B5946B848CAE5053715D8E73EFEDFD4DB188F4D45C945A3B | 545581 | | WindowsClient-11-1.5.org.default.xml | 38AF026B97AEB5F9072839C807B0A5F1E0D47C3996F419240DC6DDA90EC5F0CB | 6281 | @@ -158,8 +158,8 @@ Hashes for **PowerSTIG** files are listed in the following table: | WindowsServer-2019-DC-2.8.xml | 7C91E0EC59770DF4E3629C6B847282FF144EC753B0A231A1A1DBA8B96379E146 | 564705 | | WindowsServer-2019-DC-2.9.org.default.xml | 3D9CAFAAF084E9C316B5E5C00089045E8059F252BEAAC6FB3BFF56A69AF1C797 | 5924 | | WindowsServer-2019-DC-2.9.xml | 5D94610872795C66281BD6FA6DE1FF0F48B48A507AD259D89B76E84A51453946 | 564808 | -| WindowsServer-2019-MS-2.8.org.default.xml | DF47F2908380AD296D82A9E222A0D96C3FE99C770C3E2BBB34FD7716971C73E0 | 5856 | -| WindowsServer-2019-MS-2.8.xml | 4217BDFF7B2248D343B560CD4A0FD94A6FE3EC5F0F765B49CA7669551AC0A50B | 489284 | +| WindowsServer-2019-MS-3.1.org.default.xml | DF47F2908380AD296D82A9E222A0D96C3FE99C770C3E2BBB34FD7716971C73E0 | 5856 | +| WindowsServer-2019-MS-3.1.xml | 4217BDFF7B2248D343B560CD4A0FD94A6FE3EC5F0F765B49CA7669551AC0A50B | 489284 | | WindowsServer-2019-MS-2.9.org.default.xml | 759FDF04674BC02CF56BFF44C3899E2C4A590949A39A65C2C5EC78DF54DC4E76 | 5856 | | WindowsServer-2019-MS-2.9.xml | BF1BCF10E1E2A7718E66F388A2B31C1505EF084A70188B676FEA57DBEF5CA6A0 | 489387 | | WindowsServer-2022-DC-1.4.org.default.xml | 553EA24B9D3AA214A69117F6E003FE20A267C756F09742DEE477271AE47523BA | 5825 | diff --git a/source/StigData/Archive/Edge/U_MS_Edge_V1R7_STIG_Manual-xccdf.log b/source/StigData/Archive/Edge/U_MS_Edge_V2R1_STIG_Manual-xccdf.log similarity index 94% rename from source/StigData/Archive/Edge/U_MS_Edge_V1R7_STIG_Manual-xccdf.log rename to source/StigData/Archive/Edge/U_MS_Edge_V2R1_STIG_Manual-xccdf.log index b71137e5..20bc0cce 100644 --- a/source/StigData/Archive/Edge/U_MS_Edge_V1R7_STIG_Manual-xccdf.log +++ b/source/StigData/Archive/Edge/U_MS_Edge_V2R1_STIG_Manual-xccdf.log @@ -19,3 +19,4 @@ V-235729::HKLM\SOFTWARE\Policies\Microsoft\Edge\Recommended::HKLM\SOFTWARE\Polic V-235767::PaymentMethodQueryEnabled::"PaymentMethodQueryEnabled" V-235769::UserFeedbackAllowed::"UserFeedbackAllowed" V-251694::*::. +V-260467::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge'; ValueData = '4'; ValueName = 'DefaultCookieSetting'; ValueType = 'Dword'} diff --git a/source/StigData/Archive/Edge/U_MS_Edge_V1R7_STIG_Manual-xccdf.xml b/source/StigData/Archive/Edge/U_MS_Edge_V2R1_STIG_Manual-xccdf.xml similarity index 81% rename from source/StigData/Archive/Edge/U_MS_Edge_V1R7_STIG_Manual-xccdf.xml rename to source/StigData/Archive/Edge/U_MS_Edge_V2R1_STIG_Manual-xccdf.xml index dda4ad15..698ae81c 100644 --- a/source/StigData/Archive/Edge/U_MS_Edge_V1R7_STIG_Manual-xccdf.xml +++ b/source/StigData/Archive/Edge/U_MS_Edge_V2R1_STIG_Manual-xccdf.xml @@ -1,4 +1,4 @@ -acceptedMicrosoft Edge Security Technical Implementation GuideThis Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.DISASTIG.DOD.MILRelease: 7 Benchmark Date: 26 Jul 20233.4.0.342221.10.01I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Public<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Classified<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>II - Mission Support Sensitive<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Public<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>SRG-APP-000039<GroupDescription></GroupDescription>EDGE-00-000001User control of proxy settings must be disabled.<VulnDiscussion>This action configures the proxy settings for Microsoft Edge. +acceptedMicrosoft Edge Security Technical Implementation GuideThis Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.DISASTIG.DOD.MILRelease: 1 Benchmark Date: 24 Jul 20243.51.10.02I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>