[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-44421-6

Platform: win10Date: (C)2016-09-23   (M)2017-10-18



Select the 'Let Windows apps access call history' to user_is_in_control This policy setting specifies whether Windows apps can access call history. If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access call history by using Settings > Privacy on the device. If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization cannot change it. If you choose the "Force Deny" option, Windows apps are not allowed to access the call history and employees in your organization cannot change it. If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. Counter Measure: Enable and configure this setting to "Force Deny" depending on your organization's requirements. Potential Impact: Windows apps are not allowed to access the call history and employees in your organization cannot change it.


Parameter:


Technical Mechanism: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\App Privacy\Let Windows apps access call history (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\AppPrivacy\LetAppsAccessCallHistory

References:

Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:35437


OVAL    1
oval:org.secpod.oval:def:35437
XCCDF    2
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_10
xccdf_org.secpod_benchmark_general_Windows_10

© 2013 SecPod Technologies