Microsoft Access 2010 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +19 −18
Comparison against the immediately-prior release (V1R10). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 19
- V-241822 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-241823 Medium Enabling IE Bind to Object functionality must be present.
- V-241824 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-241825 Medium Navigation to URL's embedded in Office products must be blocked.
- V-241826 Medium Scripted Window Security must be enforced.
- V-241827 Medium Add-on Management functionality must be allowed.
- V-241828 Medium Application add-ins must be signed by Trusted Publisher.
- V-241829 Medium Data Execution Prevention must be enforced.
- V-241830 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-241831 Medium Configuration for enabling of hyperlinks must be enforced.
- V-241832 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-241833 Medium File Downloads must be configured for proper restrictions.
- V-241834 Medium Database functionality configurations must be displayed to the user.
- V-241835 Medium The Default file format must be set.
- V-241836 Medium Prompts to convert older databases must be enforced.
- V-241837 Medium Protection from zone elevation must be enforced.
- V-241838 Medium ActiveX Installs must be configured for proper restriction.
- V-241839 Medium Warning Bar settings for VBA macros must be configured.
- V-265887 High The version of Microsoft Access running on the system must be a supported version.
Removed rules 18
- V-17173 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-17174 Medium Enabling IE Bind to Object functionality must be present.
- V-17175 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-17183 Medium Navigation to URL's embedded in Office products must be blocked.
- V-17184 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-17187 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-17545 Medium Warning Bar settings for VBA macros must be configured.
- V-17584 Medium The Default file format must be set.
- V-17603 Medium Prompts to convert older databases must be enforced.
- V-17757 Medium Database functionality configurations must be displayed to the user.
- V-17810 Medium Configuration for enabling of hyperlinks must be enforced.
- V-26584 Medium Add-on Management functionality must be allowed.
- V-26585 Medium Protection from zone elevation must be enforced.
- V-26586 Medium ActiveX Installs must be configured for proper restriction.
- V-26587 Medium File Downloads must be configured for proper restrictions.
- V-26588 Medium Scripted Window Security must be enforced.
- V-26589 Medium Application add-ins must be signed by Trusted Publisher.
- V-26590 Medium Data Execution Prevention must be enforced.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104 - Access
- Vuln IDs
-
- V-241822
- Rule IDs
-
- SV-241822r961092_rule
Checks: C-45097r697757_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" must be "Enabled" and a check in the "msaccess.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45056r697758_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the "msaccess.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111 - Access
- Vuln IDs
-
- V-241823
- Rule IDs
-
- SV-241823r960921_rule
Checks: C-45098r697760_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the "msaccess.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45057r697761_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the "msaccess.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117 - Access
- Vuln IDs
-
- V-241824
- Rule IDs
-
- SV-241824r961092_rule
Checks: C-45099r697763_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the "msaccess.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45058r697764_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the "msaccess.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123 - Access
- Vuln IDs
-
- V-241825
- Rule IDs
-
- SV-241825r961092_rule
Checks: C-45100r697766_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the "msaccess.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45059r697767_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the "msaccess.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124 - Access
- Vuln IDs
-
- V-241826
- Rule IDs
-
- SV-241826r960921_rule
Checks: C-45101r697801_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" must be set to "Enabled" and "msaccess.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45060r697802_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and "msaccess.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126 - Access
- Vuln IDs
-
- V-241827
- Rule IDs
-
- SV-241827r961086_rule
Checks: C-45102r697789_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management" must be set to "Enabled" and "msaccess.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45061r697790_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and "msaccess.exe" is checked.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127 - Access
- Vuln IDs
-
- V-241828
- Rule IDs
-
- SV-241828r960954_rule
Checks: C-45103r849730_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-45062r697805_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO128 - Access
- Vuln IDs
-
- V-241829
- Rule IDs
-
- SV-241829r961092_rule
Checks: C-45104r697807_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center "Turn off Data Execution Prevention" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-45063r697808_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center "Turn off Data Execution Prevention" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129 - Access
- Vuln IDs
-
- V-241830
- Rule IDs
-
- SV-241830r961086_rule
Checks: C-45105r697769_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and "msaccess.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45064r697770_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select "msaccess.exe".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO130 - Access
- Vuln IDs
-
- V-241831
- Rule IDs
-
- SV-241831r961779_rule
Checks: C-45106r849732_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010-> Application Settings -> Web Options... -> General "Underline Hyperlink" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\internet Criteria: If the value DoNotUnderlineHyperlinks is REG_DWORD = 0, this is not a finding.
Fix: F-45065r697787_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Web Options... -> General "Underline Hyperlinks" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131 - Access
- Vuln IDs
-
- V-241832
- Rule IDs
-
- SV-241832r960954_rule
Checks: C-45107r849734_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-45066r698129_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132 - Access
- Vuln IDs
-
- V-241833
- Rule IDs
-
- SV-241833r961089_rule
Checks: C-45108r697798_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" must be set to "Enabled" and "msaccess.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45067r697799_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and "msaccess.exe" is checked.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO135 - Access
- Vuln IDs
-
- V-241834
- Rule IDs
-
- SV-241834r960963_rule
Checks: C-45109r697783_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Tools \ Security "Modal Trust Decision Only" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value ModalTrustDecisionOnly is REG_DWORD = 0, this is not a finding.
Fix: F-45068r697784_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Tools \ Security "Modal Trust Decision Only" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO136 - Access
- Vuln IDs
-
- V-241835
- Rule IDs
-
- SV-241835r960963_rule
Checks: C-45110r697777_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous "Default File Format" must be set to "Enabled (Access 2007)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\settings Criteria: If the value Default File Format is REG_DWORD = 0x0000000c (hex) or 12 (Decimal), this is not a finding.
Fix: F-45069r697778_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous "Default File Format" to "Enabled (Access 2007)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO137 - Access
- Vuln IDs
-
- V-241836
- Rule IDs
-
- SV-241836r961863_rule
Checks: C-45111r697780_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous "Do not prompt to convert older databases" must be "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\settings Criteria: If the value NoConvertDialog is REG_DWORD = 0, this is not a finding.
Fix: F-45070r697781_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous "Do not prompt to convert older databases" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209 - Access
- Vuln IDs
-
- V-241837
- Rule IDs
-
- SV-241837r960921_rule
Checks: C-45112r697792_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" must be set to "Enabled" and "msaccess.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45071r697793_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and "msaccess.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211 - Access
- Vuln IDs
-
- V-241838
- Rule IDs
-
- SV-241838r961779_rule
Checks: C-45113r849736_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" must be set to "Enabled" and "msaccess.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45072r697796_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and "msaccess.exe" is checked.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304 - Access
- Vuln IDs
-
- V-241839
- Rule IDs
-
- SV-241839r960963_rule
Checks: C-45114r697774_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010-> Application Settings -> Security -> Trust Center "VBA Macro Notification Settings" must be "Enabled (Disabled all with notifications)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-45073r697775_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center "VBA Macro Warning Settings" to "Enabled (Disabled all with notifications)".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO999 - Access
- Vuln IDs
-
- V-265887
- Rule IDs
-
- SV-265887r999865_rule
Checks: C-69806r999863_chk
Microsoft Access 2010 is no longer supported by the vendor. If the system is running Microsoft Access 2010, this is a finding.
Fix: F-69710r999864_fix
Upgrade to a supported version.