DoD Compliance · STIG

Microsoft Access 2007

V4R11 · · · Released 23 Jan 2015 · 12 rules
Compare

Pick two releases to diff their requirements.

View

Open a previous version of this STIG.

Digest of Updates vs. V4R10 · 24 Jan 2014 No substantive changes

Comparison against the immediately-prior release (V4R10). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.

No substantive changes detected against the previous release. 12 rules matched cleanly.

Sort by
b
Disable user name and password syntax from being used in URLs
Medium - V-17173 - SV-19429r1_rule
RMF Control
Severity
M
CCI
Version
DTOO104 - Access
Vuln IDs
  • V-17173
Rule IDs
  • SV-19429r1_rule
The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com. A malicious user might use this URL syntax to create a hyperlink that appears to open a legitimate Web site but actually opens a deceptive (spoofed) Web site. For example, the URL http://www.wingtiptoys.com@example.com appears to open http://www.wingtiptoys.com but actually opens http://example.com. To protect users from such attacks, Internet Explorer usually blocks any URLs using this syntax. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). If user names and passwords in URLs are allowed, users could be diverted to dangerous Web pages, which could pose a security risk. System AdministratorInformation Assurance OfficerECSC-1
Checks: C-19314r1_chk

If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” Set to “Enabled” and ‘msaccess.exe’ check box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” Set to “Enabled” and ‘msaccess.exe’ check box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.

Fix: F-17763r1_fix

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” Set to “Enabled” and ‘msaccess.exe’ check box. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.

b
Bind to Object - Access
Medium - V-17174 - SV-18190r1_rule
RMF Control
Severity
M
CCI
Version
DTOO111 - Access
Vuln IDs
  • V-17174
Rule IDs
  • SV-18190r1_rule
Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the control is set in the registry, or if the security settings for the zone in which the control is located do not allow it to be initialized. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). A security risk could occur if potentially dangerous controls are allowed to load. System AdministratorInformation Assurance OfficerECSC-1
Checks: C-17872r1_chk

If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.

Fix: F-16966r1_fix

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘msaccess.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.

b
Saved from URL - Access
Medium - V-17175 - SV-18205r1_rule
RMF Control
Severity
M
CCI
Version
DTOO117 - Access
Vuln IDs
  • V-17175
Rule IDs
  • SV-18205r1_rule
Typically, when Internet Explorer loads a Web page from a UNC share that contains a Mark of the Web (MOTW) comment that indicates the page was saved from a site on the Internet, Internet Explorer runs the page in the Internet security zone instead of the less restrictive Local Intranet security zone. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). If Internet Explorer does not evaluate the page for a MOTW, potentially dangerous code could be allowed to run.System AdministratorInformation Assurance OfficerECSC-1
Checks: C-17888r1_chk

If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.

Fix: F-17052r1_fix

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘msaccess.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.

b
Block navigation to URL embedded in Office products to protect against attack by malformed URL.
Medium - V-17183 - SV-18603r1_rule
RMF Control
Severity
M
CCI
Version
DTOO123 - Access
Vuln IDs
  • V-17183
Rule IDs
  • SV-18603r1_rule
To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). If Internet Explorer attempts to load a malformed URL, a security risk could occur in some cases.System AdministratorInformation Assurance OfficerECSC-1
Checks: C-18845r1_chk

If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.

Fix: F-17445r1_fix

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘msaccess.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.

b
No pop-ups - Access
Medium - V-17184 - SV-18215r1_rule
RMF Control
Severity
M
CCI
Version
DTOO129 - Access
Vuln IDs
  • V-17184
Rule IDs
  • SV-18215r1_rule
The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can be controlled separately for instances of Internet Explorer spawned by 2007 Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). If the Pop-up Blocker is disabled, disruptive and potentially dangerous pop-up windows could load and present a security risk.System AdministratorInformation Assurance OfficerECSC-1
Checks: C-17900r1_chk

If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.

Fix: F-17060r1_fix

The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘msaccess.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.

b
Disable Trust Bar Notification for unsigned application add-ins - Access
Medium - V-17187 - SV-18219r1_rule
RMF Control
Severity
M
CCI
Version
DTOO131 - Access
Vuln IDs
  • V-17187
Rule IDs
  • SV-18219r1_rule
By default, if an application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.System AdministratorInformation Assurance OfficerECSC-1
Checks: C-17912r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.

Fix: F-17079r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”.

b
Allow Trusted Locations not on the computer - Access
Medium - V-17321 - SV-18358r1_rule
RMF Control
Severity
M
CCI
Version
DTOO134 - Access
Vuln IDs
  • V-17321
Rule IDs
  • SV-18358r1_rule
By default, files located in trusted locations and specified in the Trust Center are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission. By default, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by selecting the Allow Trusted Locations on my network (not recommended) check box in the Trusted Locations section of the Trust Center. If a dangerous file is opened from a trusted location, it will not be subject to typical security measures and could affect users' computers or data. System AdministratorInformation Assurance OfficerECSC-1
Checks: C-17942r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations not on the computer” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Security\Trusted Locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.

Fix: F-17210r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations not on the computer” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Security\Trusted Locations Criteria: Set the value AllowNetworkLocations is REG_DWORD = 0.

b
Enable Warning Bar settings for VBA macros contained in Access Files.
Medium - V-17545 - SV-18637r1_rule
RMF Control
Severity
M
CCI
Version
DTOO304 - Access
Vuln IDs
  • V-17545
Rule IDs
  • SV-18637r1_rule
By default, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking Options on the Trust Bar and selecting the appropriate action. If users enable dangerous macros, it could affect their computers or cause sensitive information to be compromised. System AdministratorInformation Assurance OfficerECSC-1
Checks: C-18854r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Security -> Trust Center “VBA Macro Warning Settings” will be set to “Enabled (Trust Bar warning for all macros)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.

Fix: F-17465r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Security -> Trust Center “VBA Macro Warning Settings” will be set to “Enabled (Trust Bar warning for all macros)”.

b
Set the default saved file format for Access.
Medium - V-17584 - SV-18706r1_rule
RMF Control
Severity
M
CCI
Version
DTOO136 - Access
Vuln IDs
  • V-17584
Rule IDs
  • SV-18706r1_rule
By default, when users create new database files, Access 2007 saves them in the new Access 2007 format. Users can change this functionality by clicking the Office button, clicking Access Options, and then selecting a file format from the Default file format list. If a new database is created in an inappropriate format, some users might be unable to open or use it. System AdministratorInformation Assurance OfficerECSC-1
Checks: C-18884r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Miscellaneous “Default File Format” will be set to “Enabled (Access 2007)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Settings Criteria: If the value Default File Format is REG_DWORD = 0c (hex) or 12 (Decimal), this is not a finding.

Fix: F-17502r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Miscellaneous “Default File Format” will be set to “Enabled (Access 2007)”.

b
Do not Prompt to convert when opening older databases - Access.
Medium - V-17603 - SV-18733r1_rule
RMF Control
Severity
M
CCI
Version
DTOO137 - Access
Vuln IDs
  • V-17603
Rule IDs
  • SV-18733r1_rule
By default, when users open databases that were created in the Access 97 file format, Access 2007 prompts them to convert the database to a newer file format. Users can choose to convert the database or leave it in the older format. If this configuration is changed, Access will leave Access 97-format databases unchanged. Access informs the user that the database is in the older format, but does not provide the user with an option to convert the database. Some features introduced in more recent versions of Access will not be available, and the user will not be able to make any design changes to the database. System AdministratorInformation Assurance OfficerECSC-1
Checks: C-18905r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Miscellaneous “Do not prompt to convert older databases” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Settings Criteria: If the value NoConvertDialog is REG_DWORD = 0, this is not a finding.

Fix: F-17521r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Miscellaneous “Do not prompt to convert older databases” will be set to “Disabled”.

b
Enable Modal Trust Decision Only - Access
Medium - V-17757 - SV-18952r1_rule
RMF Control
Severity
M
CCI
Version
DTOO135 - Access
Vuln IDs
  • V-17757
Rule IDs
  • SV-18952r1_rule
By default, when users open an untrusted Access 2007 database that contains user-programmed executable components, Access opens the database with the components disabled and displays the Message Bar with a warning that database content has been disabled. Users can inspect the contents of the database, but cannot use any disabled functionality until they enable it by clicking Options on the Message Bar and selecting the appropriate action. The default configuration can be changed so that users see a dialog box when they open an untrusted database with executable components. Users must then choose whether to enable or disable the components before working with the database. In these circumstances users frequently enable the components, even if they do not require them. Executable components can be used to launch an attack against a computer environment. System AdministratorInformation Assurance OfficerECSC-1
Checks: C-19019r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Tools \ Security “Modal Trust Decision Only” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Security Criteria: If the value ModalTrustDecisionOnly is REG_DWORD = 0, this is not a finding.

Fix: F-17656r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Tools \ Security “Modal Trust Decision Only” will be set to “Disabled”.

b
Enable the feature to underline hyperlinks in Access.
Medium - V-17810 - SV-19046r1_rule
RMF Control
Severity
M
CCI
Version
DTOO130 - Access
Vuln IDs
  • V-17810
Rule IDs
  • SV-19046r1_rule
By default, Access 2007 underlines hyperlinks that appear in tables, queries, forms, and reports. If this configuration is changed, users might click on dangerous hyperlinks without realizing it, which could pose a security riskSystem AdministratorInformation Assurance OfficerECSC-1
Checks: C-19077r1_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Web Options -> General “Underline Hyperlinks” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Access\Internet Criteria: If the value DoNotUnderlineHyperlinks is REG_DWORD = 0, this is not a finding.

Fix: F-17711r1_fix

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Access 2007 -> Application Settings -> Web Options -> General “Underline Hyperlinks” will be set to “Enabled”.