diff --git a/CHANGELOG.md b/CHANGELOG.md index aa4f98bde..bc47bccbe 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,7 @@ ## [Unreleased] +* Fix for Chrome issue Registry Path is incorrect [#1215](https://github.com/microsoft/PowerStig/issues/1215) * Update PowerSTIG to Parse/Apply U_MS_Office_365_ProPlus_V2R11_STIG: [#1281](https://github.com/microsoft/PowerStig/issues/1281) * Update PowerSTIG to Parse/Apply U_MS_Windows_11_V1R5_STIG: [#1273](https://github.com/microsoft/PowerStig/issues/1273) diff --git a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log index 38ff6f0f7..53118185b 100644 --- a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log +++ b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log @@ -7,7 +7,7 @@ V-221563::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Ke V-221564::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderName'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization approved encrypted search provider'"} V-221565::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderSearchURL'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization-approved encrypted search string'"} V-221588::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DownloadRestrictions'; ValueType = 'Dword'; ValueData = $null; OrganizationValueTestString = "{0} -eq '1|2'"} -V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'AutoplayAllowlist'; ValueType = 'MultiString'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"} +V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist'; ValueName = '1'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"} V-234701::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'SSLVersionMin'; ValueType = 'String'; ValueData = 'tls1.2'} V-245539::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Absent'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'CookiesSessionOnlyForUrls'} -V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = 'CookiesSessionOnlyForUrls'; ValueType = 'String'; ValueData = 'javascript://*'} +V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = '1'; ValueType = 'String'; ValueData = 'javascript://*'} diff --git a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log index 38ff6f0f7..53118185b 100644 --- a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log +++ b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log @@ -7,7 +7,7 @@ V-221563::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Ke V-221564::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderName'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization approved encrypted search provider'"} V-221565::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderSearchURL'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization-approved encrypted search string'"} V-221588::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DownloadRestrictions'; ValueType = 'Dword'; ValueData = $null; OrganizationValueTestString = "{0} -eq '1|2'"} -V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'AutoplayAllowlist'; ValueType = 'MultiString'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"} +V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist'; ValueName = '1'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"} V-234701::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'SSLVersionMin'; ValueType = 'String'; ValueData = 'tls1.2'} V-245539::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Absent'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'CookiesSessionOnlyForUrls'} -V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = 'CookiesSessionOnlyForUrls'; ValueType = 'String'; ValueData = 'javascript://*'} +V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = '1'; ValueType = 'String'; ValueData = 'javascript://*'} diff --git a/source/StigData/Processed/Google-Chrome-2.7.org.default.xml b/source/StigData/Processed/Google-Chrome-2.7.org.default.xml index 7d592f5fe..0476e0f20 100644 --- a/source/StigData/Processed/Google-Chrome-2.7.org.default.xml +++ b/source/StigData/Processed/Google-Chrome-2.7.org.default.xml @@ -13,7 +13,7 @@ - + diff --git a/source/StigData/Processed/Google-Chrome-2.7.xml b/source/StigData/Processed/Google-Chrome-2.7.xml index 047408bca..30dc82a88 100644 --- a/source/StigData/Processed/Google-Chrome-2.7.xml +++ b/source/StigData/Processed/Google-Chrome-2.7.xml @@ -1,4 +1,4 @@ - + <VulnDiscussion>Google Chrome is being continually updated by the vendor in order to address identified security vulnerabilities. Running an older version of the browser can introduce security vulnerabilities to the system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls> @@ -283,7 +283,7 @@ Windows method: javascript://* - CookiesSessionOnlyForUrls + 1 String @@ -698,7 +698,7 @@ Windows method: Present False - HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome + HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist V-81589 True {0} -eq 'a list of administrator-approved URLs @@ -711,8 +711,8 @@ Windows method: 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “AutoplayAllowlist” key may contain a list of administrator-approved URLs. This requirement is optional. - AutoplayAllowlist - MultiString + 1 + String <VulnDiscussion>Enable URL-keyed anonymized data collection in Google Chrome and prevent users from changing this setting. diff --git a/source/StigData/Processed/Google-Chrome-2.8.org.default.xml b/source/StigData/Processed/Google-Chrome-2.8.org.default.xml index 0784de38a..b20873e5d 100644 --- a/source/StigData/Processed/Google-Chrome-2.8.org.default.xml +++ b/source/StigData/Processed/Google-Chrome-2.8.org.default.xml @@ -13,7 +13,7 @@ - + diff --git a/source/StigData/Processed/Google-Chrome-2.8.xml b/source/StigData/Processed/Google-Chrome-2.8.xml index 245f381d5..891a4fc57 100644 --- a/source/StigData/Processed/Google-Chrome-2.8.xml +++ b/source/StigData/Processed/Google-Chrome-2.8.xml @@ -1,4 +1,4 @@ - + <VulnDiscussion>Google Chrome is being continually updated by the vendor in order to address identified security vulnerabilities. Running an older version of the browser can introduce security vulnerabilities to the system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls> @@ -283,7 +283,7 @@ Windows method: javascript://* - CookiesSessionOnlyForUrls + 1 String @@ -698,7 +698,7 @@ Windows method: Present False - HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome + HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist V-81589 True {0} -eq 'a list of administrator-approved URLs @@ -711,8 +711,8 @@ Windows method: 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “AutoplayAllowlist” key may contain a list of administrator-approved URLs. This requirement is optional. - AutoplayAllowlist - MultiString + 1 + String <VulnDiscussion>Enable URL-keyed anonymized data collection in Google Chrome and prevent users from changing this setting.