From Google Chrome v24 Windows STIG
Part of DTBC0001 - Disable firewall traversal from remote host
Associated with IA controls: ECSC-1
Associated with: CCI-001588
Remote connections should never be allowed that bypass the firewall, as there is no way to verify if they can be trusted.
Valid for Chrome Browser version 14 or later. Windows registry: Key Path: HKLM\Software\Policies\Google\Chrome\ Value Name: RemoteAccessHostFirewallTraversal Value Type: Boolean (REG_DWORD) Value Data: 0 Windows group policy: Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Configure remote access options\ Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A
Universal method (Requires Chrome Browser v15 or later): 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer