| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-221558 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Firewall traversal from remote host must be disabl... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Remote Access Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: B6AA552093C875CFBF6E0F8C4BAA73C928D1447E ~~~~~ 'Enable firewall traversal from remote access host' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: RemoteAccessHostFirewallTraversal Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221558 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Firewall traversal from remote host must be disabl... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Remote Access Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: B6AA552093C875CFBF6E0F8C4BAA73C928D1447E ~~~~~ 'Enable firewall traversal from remote access host' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: RemoteAccessHostFirewallTraversal Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221558 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Firewall traversal from remote host must be disabl... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Remote Access Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: B6AA552093C875CFBF6E0F8C4BAA73C928D1447E ~~~~~ 'Enable firewall traversal from remote access host' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: RemoteAccessHostFirewallTraversal Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221558 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Firewall traversal from remote host must be disabl... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Remote Access Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: B6AA552093C875CFBF6E0F8C4BAA73C928D1447E ~~~~~ 'Enable firewall traversal from remote access host' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: RemoteAccessHostFirewallTraversal Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221559 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Site tracking users location must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: A13562B6341A89B3C907EB231590C9B48A11B3D1 ~~~~~ 'Default geolocation setting' is Enabled: (Do not allow any site to track the users' physical location) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultGeolocationSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221559 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Site tracking users location must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: A13562B6341A89B3C907EB231590C9B48A11B3D1 ~~~~~ 'Default geolocation setting' is Enabled: (Do not allow any site to track the users' physical location) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultGeolocationSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221559 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Site tracking users location must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: A13562B6341A89B3C907EB231590C9B48A11B3D1 ~~~~~ 'Default geolocation setting' is Enabled: (Do not allow any site to track the users' physical location) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultGeolocationSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221559 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Site tracking users location must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: A13562B6341A89B3C907EB231590C9B48A11B3D1 ~~~~~ 'Default geolocation setting' is Enabled: (Do not allow any site to track the users' physical location) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultGeolocationSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221561 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Sites ability to show pop-ups must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding. Note: If AO Approved exceptions to this rule have been enabled, this is not a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 7CA6D59CDB675C21DAED1DE671FBBE58300ECDC8 ~~~~~ 'Default popups setting' is Enabled: (Do not allow any site to show popups) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221561 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Sites ability to show pop-ups must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding. Note: If AO Approved exceptions to this rule have been enabled, this is not a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 7CA6D59CDB675C21DAED1DE671FBBE58300ECDC8 ~~~~~ 'Default popups setting' is Enabled: (Do not allow any site to show popups) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221561 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Sites ability to show pop-ups must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding. Note: If AO Approved exceptions to this rule have been enabled, this is not a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 7CA6D59CDB675C21DAED1DE671FBBE58300ECDC8 ~~~~~ 'Default popups setting' is Enabled: (Do not allow any site to show popups) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221561 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Sites ability to show pop-ups must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding. Note: If AO Approved exceptions to this rule have been enabled, this is not a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 7CA6D59CDB675C21DAED1DE671FBBE58300ECDC8 ~~~~~ 'Default popups setting' is Enabled: (Do not allow any site to show popups) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221562 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Extensions installation must be blocklisted by def... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlocklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlocklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blocklist Policy State: Enabled Policy Value: * Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 8F9ED6BB4A138CBF0E8EEEAFF95ACDE3476CCA81 ~~~~~ 'Configure extension installation blocklist' is Enabled: (*) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\ExtensionInstallBlocklist Value Name: 1 Value: * Type: REG_SZ
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221562 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Extensions installation must be blocklisted by def... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlocklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlocklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blocklist Policy State: Enabled Policy Value: * Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 8F9ED6BB4A138CBF0E8EEEAFF95ACDE3476CCA81 ~~~~~ 'Configure extension installation blocklist' is Enabled: (*) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\ExtensionInstallBlocklist Value Name: 1 Value: * Type: REG_SZ
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221562 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Extensions installation must be blocklisted by def... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlocklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlocklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blocklist Policy State: Enabled Policy Value: * Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 8F9ED6BB4A138CBF0E8EEEAFF95ACDE3476CCA81 ~~~~~ 'Configure extension installation blocklist' is Enabled: (*) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\ExtensionInstallBlocklist Value Name: 1 Value: * Type: REG_SZ
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221562 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Extensions installation must be blocklisted by def... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlocklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlocklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blocklist Policy State: Enabled Policy Value: * Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 8F9ED6BB4A138CBF0E8EEEAFF95ACDE3476CCA81 ~~~~~ 'Configure extension installation blocklist' is Enabled: (*) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\ExtensionInstallBlocklist Value Name: 1 Value: * Type: REG_SZ
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221564 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | The default search providers name must be set. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: BA250C98703E598AD8EE6E27C5EB161E00EC8F8D ~~~~~ 'Default search provider name' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderName Value: Google Encrypted Type: REG_SZ
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221564 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | The default search providers name must be set. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: BA250C98703E598AD8EE6E27C5EB161E00EC8F8D ~~~~~ 'Default search provider name' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderName Value: Google Encrypted Type: REG_SZ
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221564 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | The default search providers name must be set. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: BA250C98703E598AD8EE6E27C5EB161E00EC8F8D ~~~~~ 'Default search provider name' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderName Value: Google Encrypted Type: REG_SZ
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221564 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | The default search providers name must be set. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: BA250C98703E598AD8EE6E27C5EB161E00EC8F8D ~~~~~ 'Default search provider name' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderName Value: Google Encrypted Type: REG_SZ
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221565 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | The default search provider URL must be set to per... | - | |||
Check TextIf the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome://policy. 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ), this is a finding. Fix TextIf the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\. - Policy Name: Default search provider search URL - Policy State: Enabled - Policy Value: Must be set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 4E2A308B8138082CBCDE899BDC5B493E0085A6E2 ~~~~~ 'Default search provider search URL' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderSearchURL Value: https://www.google.com/search?q={searchTerms} Type: REG_SZ
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221565 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | The default search provider URL must be set to per... | - | |||
Check TextIf the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome://policy. 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ), this is a finding. Fix TextIf the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\. - Policy Name: Default search provider search URL - Policy State: Enabled - Policy Value: Must be set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 4E2A308B8138082CBCDE899BDC5B493E0085A6E2 ~~~~~ 'Default search provider search URL' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderSearchURL Value: https://www.google.com/search?q={searchTerms} Type: REG_SZ
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221565 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | The default search provider URL must be set to per... | - | |||
Check TextIf the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome://policy. 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ), this is a finding. Fix TextIf the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\. - Policy Name: Default search provider search URL - Policy State: Enabled - Policy Value: Must be set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 131C51BE43E61BFBB569FDD5F046ADBBCD65A458 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221565 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | The default search provider URL must be set to per... | - | |||
Check TextIf the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome://policy. 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ), this is a finding. Fix TextIf the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\. - Policy Name: Default search provider search URL - Policy State: Enabled - Policy Value: Must be set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 131C51BE43E61BFBB569FDD5F046ADBBCD65A458 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221566 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Default search provider must be enabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 2449380066A51563EDEB3E5E4AC33CFAC8D13C1C ~~~~~ 'Enable the default search provider' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderEnabled Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221566 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Default search provider must be enabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 2449380066A51563EDEB3E5E4AC33CFAC8D13C1C ~~~~~ 'Enable the default search provider' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderEnabled Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221566 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Default search provider must be enabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 2449380066A51563EDEB3E5E4AC33CFAC8D13C1C ~~~~~ 'Enable the default search provider' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderEnabled Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221566 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Default search provider must be enabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 2449380066A51563EDEB3E5E4AC33CFAC8D13C1C ~~~~~ 'Enable the default search provider' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: DefaultSearchProviderEnabled Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221567 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | The Password Manager must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable Saving Passwords to the Password Manager Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: DB7006051F07865D414129854D8C342B284EDD73 ~~~~~ 'Enable Saving Passwords to the Password Manager' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: PasswordManagerEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221567 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | The Password Manager must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable Saving Passwords to the Password Manager Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: DB7006051F07865D414129854D8C342B284EDD73 ~~~~~ 'Enable Saving Passwords to the Password Manager' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: PasswordManagerEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221567 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | The Password Manager must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable Saving Passwords to the Password Manager Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: DB7006051F07865D414129854D8C342B284EDD73 ~~~~~ 'Enable Saving Passwords to the Password Manager' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: PasswordManagerEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221567 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | The Password Manager must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable Saving Passwords to the Password Manager Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: DB7006051F07865D414129854D8C342B284EDD73 ~~~~~ 'Enable Saving Passwords to the Password Manager' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: PasswordManagerEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221570 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Background processing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: FDA40B1CAE77587F47001714CF227FBABCE9246D ~~~~~ 'Continue running background apps when Google Chrome is closed' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221570 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Background processing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: FDA40B1CAE77587F47001714CF227FBABCE9246D ~~~~~ 'Continue running background apps when Google Chrome is closed' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221570 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Background processing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: FDA40B1CAE77587F47001714CF227FBABCE9246D ~~~~~ 'Continue running background apps when Google Chrome is closed' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221570 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Background processing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: FDA40B1CAE77587F47001714CF227FBABCE9246D ~~~~~ 'Continue running background apps when Google Chrome is closed' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221571 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Google Data Synchronization must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: B44660AB12170102BE7D91FAF7781C708BE9E912 ~~~~~ 'Disable synchronization of data with Google' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221571 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Google Data Synchronization must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: B44660AB12170102BE7D91FAF7781C708BE9E912 ~~~~~ 'Disable synchronization of data with Google' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221571 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Google Data Synchronization must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: B44660AB12170102BE7D91FAF7781C708BE9E912 ~~~~~ 'Disable synchronization of data with Google' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221571 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Google Data Synchronization must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: B44660AB12170102BE7D91FAF7781C708BE9E912 ~~~~~ 'Disable synchronization of data with Google' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221572 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | The URL protocol schema javascript must be disable... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy. 2. If URLBlocklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlocklist. 3. If the URLBlocklist key does not exist, or the does not contain entries 1 set to javascript://*, this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs. - Policy State: Enabled - Policy Value 1: javascript://* Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: DAEDE8A412B63ACCA5E9A968BCDCD657B7551F62 ~~~~~ 'Block access to a list of URLs' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\URLBlocklist Value Name: 1 Value: javascript://* Type: REG_SZ
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221572 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | The URL protocol schema javascript must be disable... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy. 2. If URLBlocklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlocklist. 3. If the URLBlocklist key does not exist, or the does not contain entries 1 set to javascript://*, this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs. - Policy State: Enabled - Policy Value 1: javascript://* Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: DAEDE8A412B63ACCA5E9A968BCDCD657B7551F62 ~~~~~ 'Block access to a list of URLs' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\URLBlocklist Value Name: 1 Value: javascript://* Type: REG_SZ
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221572 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | The URL protocol schema javascript must be disable... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy. 2. If URLBlocklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlocklist. 3. If the URLBlocklist key does not exist, or the does not contain entries 1 set to javascript://*, this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs. - Policy State: Enabled - Policy Value 1: javascript://* Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: DAEDE8A412B63ACCA5E9A968BCDCD657B7551F62 ~~~~~ 'Block access to a list of URLs' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\URLBlocklist Value Name: 1 Value: javascript://* Type: REG_SZ
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221572 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | The URL protocol schema javascript must be disable... | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy. 2. If URLBlocklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlocklist. 3. If the URLBlocklist key does not exist, or the does not contain entries 1 set to javascript://*, this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs. - Policy State: Enabled - Policy Value 1: javascript://* Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: DAEDE8A412B63ACCA5E9A968BCDCD657B7551F62 ~~~~~ 'Block access to a list of URLs' is Configured Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome\URLBlocklist Value Name: 1 Value: javascript://* Type: REG_SZ
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221573 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Cloud print sharing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Printing Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: C3EBC76D9B66FB2901C25ED5B2A7015EE5C81D5A ~~~~~ 'Enable Google Cloud Print proxy' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: CloudPrintProxyEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221573 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Cloud print sharing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Printing Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: C3EBC76D9B66FB2901C25ED5B2A7015EE5C81D5A ~~~~~ 'Enable Google Cloud Print proxy' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: CloudPrintProxyEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||
| V-221573 | CAT II | MONT-SW-89108 | Google Chrome Current Windows Security T... | Cloud print sharing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Printing Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: C3EBC76D9B66FB2901C25ED5B2A7015EE5C81D5A ~~~~~ 'Enable Google Cloud Print proxy' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: CloudPrintProxyEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_Chrome_V2R11_20251217-202759.ckl
Scan Date: 2026-03-04T15:25:15.778437
Technology Area: Windows Operating System
|
||||||||
| V-221573 | CAT II | MONT-SW-89134 | Google Chrome Current Windows Security T... | Cloud print sharing must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Printing Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A Finding DetailsEvaluate-STIG 1.2510.0 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: C3EBC76D9B66FB2901C25ED5B2A7015EE5C81D5A ~~~~~ 'Enable Google Cloud Print proxy' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: CloudPrintProxyEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_Chrome_V2R11_20251217-200930.ckl
Scan Date: 2026-03-04T15:25:41.812659
Technology Area: Windows Operating System
|
||||||||
| V-221574 | CAT II | MONT-WS-92040 | Google Chrome Current Windows Security T... | Network prediction must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If "NetworkPredictionOptions" is not displayed under the “Policy Name” column or it is not set to "2" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "NetworkPredictionOptions" value name does not exist or its value data is not set to "2," this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable network prediction Policy State: Enabled Policy Value: Do not predict network actions on any network connection Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: F28F59977E21D5CF2487D033A4005934219BD961 ~~~~~ 'Enable network prediction' is Enabled: (Do not predict network actions on any network connection) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: NetworkPredictionOptions Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_Chrome_V2R11_20251023-142120.ckl
Scan Date: 2026-01-14T12:57:25.338171
Technology Area: Windows Operating System
|
||||||||
| V-221574 | CAT II | MONT-WS-92010 | Google Chrome Current Windows Security T... | Network prediction must be disabled. | - | |||
Check TextUniversal method: 1. In the omnibox (address bar) type chrome://policy 2. If "NetworkPredictionOptions" is not displayed under the “Policy Name” column or it is not set to "2" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "NetworkPredictionOptions" value name does not exist or its value data is not set to "2," this is a finding. Fix TextWindows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable network prediction Policy State: Enabled Policy Value: Do not predict network actions on any network connection Finding DetailsEvaluate-STIG 1.2507.5 (Scan-GoogleChrome_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: F28F59977E21D5CF2487D033A4005934219BD961 ~~~~~ 'Enable network prediction' is Enabled: (Do not predict network actions on any network connection) Registry Path: HKLM:\SOFTWARE\Policies\Google\Chrome Value Name: NetworkPredictionOptions Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_Chrome_V2R11_20251023-140804.ckl
Scan Date: 2026-01-14T12:57:27.625294
Technology Area: Windows Operating System
|
||||||||