Microsoft Access 2010
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - Access
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-33401r1_rule
Checks: C-33884r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” must be “Enabled” and a check in the ‘msaccess.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29573r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” to “Enabled” and place a check in the ‘msaccess.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - Access
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-33387r1_rule
Checks: C-33870r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” must be “Enabled” and a check in the ‘msaccess.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29559r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” to “Enabled” and place a check in the ‘msaccess.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - Access
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-33420r1_rule
Checks: C-33904r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” must be “Enabled” and a check in the ‘msaccess.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29592r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” to “Enabled” and place a check in the ‘msaccess.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - Access
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-33410r1_rule
Checks: C-33894r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” must be “Enabled” and a check in the ‘msaccess.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29583r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” to “Enabled” and place a check in the ‘msaccess.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - Access
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-33399r1_rule
Checks: C-33882r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” must be “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29571r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” to “Enabled” and select ‘msaccess.exe’.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131 - Access
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-33422r1_rule
Checks: C-33905r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins and block them” must be “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-29594r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins and block them” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO304 - Access
- Vuln IDs
-
- V-17545
- Rule IDs
-
- SV-33424r1_rule
Checks: C-33907r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010-> Application Settings -> Security -> Trust Center “VBA Macro Notification Settings” must be “Enabled (Disabled all with notifications)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-29596r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center “VBA Macro Warning Settings” to “Enabled (Disabled all with notifications)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO136 - Access
- Vuln IDs
-
- V-17584
- Rule IDs
-
- SV-33430r1_rule
Checks: C-33913r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous “Default File Format” must be set to “Enabled (Access 2007)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\settings Criteria: If the value Default File Format is REG_DWORD = 0x0000000c (hex) or 12 (Decimal), this is not a finding.
Fix: F-29602r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous “Default File Format” to “Enabled (Access 2007)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO137 - Access
- Vuln IDs
-
- V-17603
- Rule IDs
-
- SV-33673r1_rule
Checks: C-34130r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous “Do not prompt to convert older databases” must be “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\settings Criteria: If the value NoConvertDialog is REG_DWORD = 0, this is not a finding.
Fix: F-29815r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Miscellaneous “Do not prompt to convert older databases” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO135 - Access
- Vuln IDs
-
- V-17757
- Rule IDs
-
- SV-33433r1_rule
Checks: C-33916r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Tools \ Security “Modal Trust Decision Only” must be “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value ModalTrustDecisionOnly is REG_DWORD = 0, this is not a finding.
Fix: F-29605r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Tools \ Security “Modal Trust Decision Only” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO130 - Access
- Vuln IDs
-
- V-17810
- Rule IDs
-
- SV-33428r1_rule
Checks: C-33911r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010-> Application Settings -> Web Options... -> General “Underline Hyperlinks” must be “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\internet Criteria: If the value DoNotUnderlineHyperlinks is REG_DWORD = 0, this is not a finding.
Fix: F-29600r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Web Options... -> General “Underline Hyperlinks” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO126 - Access
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-33781r1_rule
Checks: C-34157r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management” must be set to “Enabled” and ‘msaccess.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29846r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management” to “Enabled” and ‘msaccess.exe’ is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209 - Access
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-33788r1_rule
Checks: C-34164r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” must be set to “Enabled” and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29853r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” to “Enabled” and 'msaccess.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO211 - Access
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-33792r1_rule
Checks: C-34168r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” must be set to “Enabled” and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29857r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” to “Enabled” and 'msaccess.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO132 - Access
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-33799r1_rule
Checks: C-34173r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” must be set to “Enabled” and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29862r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” to “Enabled” and 'msaccess.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO124 - Access
- Vuln IDs
-
- V-26588
- Rule IDs
-
- SV-33807r1_rule
Checks: C-34181r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” must be set to “Enabled” and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29870r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” to “Enabled” and 'msaccess.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO127 - Access
- Vuln IDs
-
- V-26589
- Rule IDs
-
- SV-33848r1_rule
Checks: C-34188r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center “Require that application add-ins are signed by Trusted Publisher” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-29877r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center “Require that application add-ins are signed by Trusted Publisher” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO128 - Access
- Vuln IDs
-
- V-26590
- Rule IDs
-
- SV-33854r1_rule
Checks: C-34189r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center “Turn off Data Execution Prevention” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\access\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-29878r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2010 -> Application Settings -> Security -> Trust Center “Turn off Data Execution Prevention” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO305 - Access
- Vuln IDs
-
- V-26625
- Rule IDs
-
- SV-33808r1_rule
Checks: C-34182r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” must be “Enabled" and "Disallow in Access" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\toolbars\access Criteria: If the value NoExtensibilityCustomizationFromDocument is REG_DWORD = 1, this is not a finding.
Fix: F-29871r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” to “Enabled" and select "Disallow in Access".