U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Guide to Securing Internet Explorer 5.5 using Group Policy v1.0 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Microsoft Internet Explorer 5.5 cpe:/a:microsoft:ie:5.5 (View CVEs)

Checklist Highlights

Checklist Name:
Guide to Securing Internet Explorer 5.5 using Group Policy
Checklist ID:
90
Version:
v1.0
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: National Security Agency
Original Publication Date:
06/30/2002

Checklist Summary:

This guide provides recommendations and rationale for security-relevant settings for Internet Explorer v5.5. Although Internet Explorer v6.0 is mentioned in Appendix B, the majority of this guide deals with Internet Explorer 5.5. The mechanism used to implement these recommendations is Group Policy. It is assumed that the administrator is familiar with using Group Policy in general, such as how to edit a group policy, how to link a group policy to an object, how to exclude someone from a group policy, and how to ensure that a group policy interfaces correctly with other group policies. It is recommended that the reader first read the Guide to Securing Microsoft Windows 2000 Group Policy for additional information on these subjects. Worksheets are provided in Appendix D summarizing the configuration options. These worksheets should be completed while reading this document to assist in making appropriate decisions for your network. This will help in configuring all systems on the network to the same settings, as well as being a reference for reconfiguration. All options in this document comply with the DoD mobile code policy. In order to be completely compliant with the DoD mobile code policy, decisions concerning what sites, certificates, and programs to trust must be made in accordance with that policy, as well as with any relevant local implementation guidelines.

Checklist Role:

  • Desktop Client

Known Issues:

Do not attempt to implement any of the settings in this guide without first testing in a non-operational environment. This is only a guide containing recommended security settings. It is not meant to replace well-structured policy or sound judgment. Furthermore, this guide does not address site-specific configuration issues. Care must be taken when implementing this guide to address local operational and policy concerns. This guide contains possible recommended settings for the system Registry. You can severely impair or disable a Windows system with incorrect changes or accidental deletions when using a Registry editor (Regedt32.exe or Regedit.exe) to change the system configuration. Currently, there is no undo command for deletions within the Registry. The Registry editor prompts you to confirm the deletions if Confirm on Delete is selected from the options menu. When you delete a key, the message does not include the name of the key you are deleting. Therefore, check your selection carefully before proceeding.

Target Audience:

This guide is written for administrators of Windows 2000 networks as a configuration guide for Internet Explorer 5.5. The document assumes that the reader has experience administering Windows-based systems in domain or standalone configurations.

Target Operational Environment:

  • Managed

Testing Information:

The security configuration guide has been extensively tested in a lab and operational environment.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

Refer to Known Issues.

Disclaimer:

Do not attempt to implement any of the settings in this guide without first testing them in a non-operational environment. Security configuration guides are provided for the Department of Defense and other government agencies requiring security configuration guidelines. The guides contain recommended security settings. They are not intended to replace well-structured policy or sound judgment. The guides do not address site-specific configuration issues. Care must be taken when implementing the guides to address local operational and policy concerns. All security changes described in the guides are applicable only to specifically identified operating systems or architecture components and should not be applied to any other operating system or architecture components.

Product Support:

Not provided.

Point of Contact:

SNAC.Guides@nsa.gov

Sponsor:

Not provided.

Licensing:

Refer to the legal statement provided at http://www.nsa.gov/notices/notic00004.cfm? Address=/snac/webs/ie_5_5.pdf

Change History:

v1.0, 2002-07
Updated status to Archive - 10/24/18

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 10/24/2018