National Vulnerability Database

National Vulnerability Database

National Vulnerability

Internet Explorer 9 STIG Version 1, Release 15 Checklist Details (Checklist Revisions)

Checklist Highlights

Checklist Name:
Internet Explorer 9 STIG
Checklist ID:
Version 1, Release 15
Review Status:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:

Checklist Summary:

The Internet Explorer (IE) 9 Overview, along with the IE 9 and Windows Desktop Application Security Technical Implementation Guides (STIGs), provides the technical security policies, requirements, and implementation details for applying security concepts to Microsoft IE 9 web browser.

Checklist Role:

  • Web Browser

Known Issues:

Not provided.

Target Audience:

The requirements and recommendations set forth in this document will assist IAOs and Information Assurance Managers (IAMs) in protecting web browser applications in DoD locations hereafter referred to as sites. The responsible Configuration Control Board (CCB) will approve revisions to site systems that could have a security impact. Therefore, before implementing web browser application security measures, the IAO will submit a change notice to the CCB for review and approval. Although there are a few different operating system platforms for desktop environments, this document addresses IE 9 running on Microsoft Windows 7 platforms only. This document does not include specific guidance for UNIX, Linux, or Apple desktop environments at this time. Although not directly outlined, the intent of these security requirements detailed in this document also apply to IE 9 web browser applications installed on Microsoft Windows Server platforms, as well as Microsoft Windows Workstation platforms. On server platforms, the security configuration parameters will be set to at least as restrictive values as those listed in this document.

Target Operational Environment:

  • Managed

Testing Information:

Not provided.

Regulatory Compliance:

DoDD 8500.1


Not provided.


It must be noted that the guidelines specified should be evaluated in a local, representative test environment before implementation within large user populations. The extensive variety of environments makes it impossible to test these guidelines for all potential software configurations. For some environments, failure to test before implementation may lead to a loss of required functionality.

Product Support:

Not provided.

Point of Contact:

Comments or proposed revisions to this document should be sent via email to the following address: DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.


Not provided.


Not provided.

Change History:

Version 1, Release 14 - 03 August 2015
Changed status from "Under Review" to "Final" - 03 June 2015
Version 1, Release 9 - 25 July 2014 (XCCDF only)
Version 1, Release 8 - 25 April 2014 (XCCDF only)
Version 1, Release 7 - 24 January 2014 (XCCDF only)
Version 1, Release 6 - 25 October 2013 (XCCDF only)
Version 1, Release 5 - 24 January 2014 (Benchmark)
Version 1, Release 5 - 26 April 2013
Version 1, Release 4 - 26 April 2013
Version 1, Release 3 - 13 August 2012
Version 1, Release 2 - 27 July 2012
Version 1, Release 1 - 21 May 2012
Version 1, Release 10 - 30 October 2014
Version 1, Release 11 - 15 December 2014
Version 1, Release 12 - 23 January 2015
Benchmark Version 1, Release 7 - 23 January 2015
Version 1, Release 14 - 03 August 2015
Changed status from "under review" to "final" - 11 September 2015
archived - 05/19/2017
Updated URL to reflect change to the DISA website - http --> https
Updated URLs - 6/7/19
updated URLs - 9/11/19


URL Description


Reference URL Description

NIST checklist record last modified on 09/11/2019