diff --git a/CHANGELOG.md b/CHANGELOG.md
index aa4f98bde..bc47bccbe 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -2,6 +2,7 @@
## [Unreleased]
+* Fix for Chrome issue Registry Path is incorrect [#1215](https://github.com/microsoft/PowerStig/issues/1215)
* Update PowerSTIG to Parse/Apply U_MS_Office_365_ProPlus_V2R11_STIG: [#1281](https://github.com/microsoft/PowerStig/issues/1281)
* Update PowerSTIG to Parse/Apply U_MS_Windows_11_V1R5_STIG: [#1273](https://github.com/microsoft/PowerStig/issues/1273)
diff --git a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log
index 38ff6f0f7..53118185b 100644
--- a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log
+++ b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log
@@ -7,7 +7,7 @@ V-221563::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Ke
V-221564::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderName'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization approved encrypted search provider'"}
V-221565::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderSearchURL'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization-approved encrypted search string'"}
V-221588::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DownloadRestrictions'; ValueType = 'Dword'; ValueData = $null; OrganizationValueTestString = "{0} -eq '1|2'"}
-V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'AutoplayAllowlist'; ValueType = 'MultiString'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"}
+V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist'; ValueName = '1'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"}
V-234701::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'SSLVersionMin'; ValueType = 'String'; ValueData = 'tls1.2'}
V-245539::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Absent'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'CookiesSessionOnlyForUrls'}
-V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = 'CookiesSessionOnlyForUrls'; ValueType = 'String'; ValueData = 'javascript://*'}
+V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = '1'; ValueType = 'String'; ValueData = 'javascript://*'}
diff --git a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log
index 38ff6f0f7..53118185b 100644
--- a/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log
+++ b/source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log
@@ -7,7 +7,7 @@ V-221563::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Ke
V-221564::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderName'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization approved encrypted search provider'"}
V-221565::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DefaultSearchProviderSearchURL'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'an organization-approved encrypted search string'"}
V-221588::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'DownloadRestrictions'; ValueType = 'Dword'; ValueData = $null; OrganizationValueTestString = "{0} -eq '1|2'"}
-V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'AutoplayAllowlist'; ValueType = 'MultiString'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"}
+V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist'; ValueName = '1'; ValueType = 'String'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"}
V-234701::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'SSLVersionMin'; ValueType = 'String'; ValueData = 'tls1.2'}
V-245539::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Absent'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'CookiesSessionOnlyForUrls'}
-V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = 'CookiesSessionOnlyForUrls'; ValueType = 'String'; ValueData = 'javascript://*'}
+V-221572::*::HardCodedRule(RegistryRule)@{DscResource = 'Registry'; Ensure = 'Present'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\URLBlocklist'; ValueName = '1'; ValueType = 'String'; ValueData = 'javascript://*'}
diff --git a/source/StigData/Processed/Google-Chrome-2.7.org.default.xml b/source/StigData/Processed/Google-Chrome-2.7.org.default.xml
index 7d592f5fe..0476e0f20 100644
--- a/source/StigData/Processed/Google-Chrome-2.7.org.default.xml
+++ b/source/StigData/Processed/Google-Chrome-2.7.org.default.xml
@@ -13,7 +13,7 @@
-
+
diff --git a/source/StigData/Processed/Google-Chrome-2.7.xml b/source/StigData/Processed/Google-Chrome-2.7.xml
index 047408bca..30dc82a88 100644
--- a/source/StigData/Processed/Google-Chrome-2.7.xml
+++ b/source/StigData/Processed/Google-Chrome-2.7.xml
@@ -1,4 +1,4 @@
-
+
<VulnDiscussion>Google Chrome is being continually updated by the vendor in order to address identified security vulnerabilities. Running an older version of the browser can introduce security vulnerabilities to the system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
@@ -283,7 +283,7 @@ Windows method:
javascript://*
- CookiesSessionOnlyForUrls
+ 1
String
@@ -698,7 +698,7 @@ Windows method:
Present
False
- HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome
+ HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist
V-81589
True
{0} -eq 'a list of administrator-approved URLs
@@ -711,8 +711,8 @@ Windows method:
2. Navigate to HKLM\Software\Policies\Google\Chrome\
3. If the “AutoplayAllowlist” key may contain a list of administrator-approved URLs. This requirement is optional.
- AutoplayAllowlist
- MultiString
+ 1
+ String
<VulnDiscussion>Enable URL-keyed anonymized data collection in Google Chrome and prevent users from changing this setting.
diff --git a/source/StigData/Processed/Google-Chrome-2.8.org.default.xml b/source/StigData/Processed/Google-Chrome-2.8.org.default.xml
index 0784de38a..b20873e5d 100644
--- a/source/StigData/Processed/Google-Chrome-2.8.org.default.xml
+++ b/source/StigData/Processed/Google-Chrome-2.8.org.default.xml
@@ -13,7 +13,7 @@
-
+
diff --git a/source/StigData/Processed/Google-Chrome-2.8.xml b/source/StigData/Processed/Google-Chrome-2.8.xml
index 245f381d5..891a4fc57 100644
--- a/source/StigData/Processed/Google-Chrome-2.8.xml
+++ b/source/StigData/Processed/Google-Chrome-2.8.xml
@@ -1,4 +1,4 @@
-
+
<VulnDiscussion>Google Chrome is being continually updated by the vendor in order to address identified security vulnerabilities. Running an older version of the browser can introduce security vulnerabilities to the system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
@@ -283,7 +283,7 @@ Windows method:
javascript://*
- CookiesSessionOnlyForUrls
+ 1
String
@@ -698,7 +698,7 @@ Windows method:
Present
False
- HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome
+ HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\AutoplayAllowlist
V-81589
True
{0} -eq 'a list of administrator-approved URLs
@@ -711,8 +711,8 @@ Windows method:
2. Navigate to HKLM\Software\Policies\Google\Chrome\
3. If the “AutoplayAllowlist” key may contain a list of administrator-approved URLs. This requirement is optional.
- AutoplayAllowlist
- MultiString
+ 1
+ String
<VulnDiscussion>Enable URL-keyed anonymized data collection in Google Chrome and prevent users from changing this setting.