Microsoft Access 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +17 −16
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 17
- V-238008 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-238009 Medium Enabling IE Bind to Object functionality must be present.
- V-238010 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-238011 Medium Navigation to URLs embedded in Office products must be blocked.
- V-238012 Medium Scripted Window Security must be enforced.
- V-238013 Medium Add-on Management functionality must be allowed.
- V-238014 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-238015 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-238016 Medium The configuration for enabling of hyperlinks must be enforced.
- V-238017 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-238018 Medium File Downloads must be configured for proper restrictions.
- V-238019 Medium Database functionality configurations must be displayed to the user.
- V-238020 Medium The Save commands default file format must be configured.
- V-238021 Medium Protection from zone elevation must be enforced.
- V-238022 Medium ActiveX Installs must be configured for proper restriction.
- V-238023 Medium Warning Bar settings for VBA macros must be configured.
- V-279941 High The version of Access running on the system must be a supported version.
Removed rules 16
- V-70907 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-70925 Medium Enabling IE Bind to Object functionality must be present.
- V-70927 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-70929 Medium Navigation to URLs embedded in Office products must be blocked.
- V-70931 Medium Scripted Window Security must be enforced.
- V-70933 Medium Add-on Management functionality must be allowed.
- V-70935 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-70937 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-70939 Medium The configuration for enabling of hyperlinks must be enforced.
- V-70941 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-70943 Medium File Downloads must be configured for proper restrictions.
- V-70945 Medium Database functionality configurations must be displayed to the user.
- V-70947 Medium The Save commands default file format must be configured.
- V-70949 Medium Protection from zone elevation must be enforced.
- V-70951 Medium ActiveX Installs must be configured for proper restriction.
- V-70953 Medium Warning Bar settings for VBA macros must be configured.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-238008
- V-70907
- Rule IDs
-
- SV-238008r961092_rule
- SV-85531
Checks: C-41218r650342_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41177r650343_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-238009
- V-70925
- Rule IDs
-
- SV-238009r960921_rule
- SV-85549
Checks: C-41219r650345_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41178r650346_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-238010
- V-70927
- Rule IDs
-
- SV-238010r961092_rule
- SV-85551
Checks: C-41220r650348_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41179r650349_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-238011
- V-70929
- Rule IDs
-
- SV-238011r961092_rule
- SV-85553
Checks: C-41221r650351_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41180r650352_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-238012
- V-70931
- Rule IDs
-
- SV-238012r960921_rule
- SV-85555
Checks: C-41222r650354_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41181r650355_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-238013
- V-70933
- Rule IDs
-
- SV-238013r961086_rule
- SV-85557
Checks: C-41223r650357_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41182r650358_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-238014
- V-70935
- Rule IDs
-
- SV-238014r960954_rule
- SV-85559
Checks: C-41224r650360_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Application Settings -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-41183r650361_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Application Settings -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-238015
- V-70937
- Rule IDs
-
- SV-238015r961086_rule
- SV-85561
Checks: C-41225r650363_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41184r650364_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO130
- Vuln IDs
-
- V-238016
- V-70939
- Rule IDs
-
- SV-238016r961779_rule
- SV-85563
Checks: C-41226r650366_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016-> Application Settings -> Web Options... -> General "Underline Hyperlinks" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\internet Criteria: If the value DoNotUnderlineHyperlinks is REG_DWORD = 0, this is not a finding.
Fix: F-41185r650367_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Application Settings -> Web Options... -> General "Underline Hyperlinks" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-238017
- V-70941
- Rule IDs
-
- SV-238017r960954_rule
- SV-85565
Checks: C-41227r650369_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Application Settings -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-41186r650370_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Application Settings -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-238018
- V-70943
- Rule IDs
-
- SV-238018r961089_rule
- SV-85567
Checks: C-41228r650372_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41187r650373_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO135
- Vuln IDs
-
- V-238019
- V-70945
- Rule IDs
-
- SV-238019r961779_rule
- SV-85569
Checks: C-41229r650375_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Tools \ Security "Modal Trust Decision Only" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security Criteria: If the value ModalTrustDecisionOnly is REG_DWORD = 0, this is not a finding.
Fix: F-41188r650376_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Tools \ Security "Modal Trust Decision Only" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO136
- Vuln IDs
-
- V-238020
- V-70947
- Rule IDs
-
- SV-238020r960963_rule
- SV-85571
Checks: C-41230r650378_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Miscellaneous "Default File Format" is set to "Enabled (Access 2007)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\settings Criteria: If the value Default File Format is REG_DWORD = 0x0000000c (hex) or 12 (Decimal), this is not a finding.
Fix: F-41189r650379_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Miscellaneous "Default File Format" to "Enabled (Access 2007)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-238021
- V-70949
- Rule IDs
-
- SV-238021r960921_rule
- SV-85573
Checks: C-41231r650381_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41190r650382_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-238022
- V-70951
- Rule IDs
-
- SV-238022r961779_rule
- SV-85575
Checks: C-41232r650384_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'msaccess.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value msaccess.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41191r650385_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'msaccess.exe' check box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-238023
- V-70953
- Rule IDs
-
- SV-238023r960963_rule
- SV-85577
Checks: C-41233r650387_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Application Settings -> Security -> Trust Center -> "VBA macro Notification Settings" is set to "Enabled: Disable all with notification". The options ‘Enabled: Disable all except digitally signed macros’ and ‘Enabled: Disable all without notification’ are more restrictive and also acceptable values. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security Criteria: If the value vbawarnings is REG_DWORD = 2, this is not a finding. Values of REG_DWORD = 3 or 4 are also acceptable values. If the registry key does not exist or the value is REG_DWORD =1, then this is a finding.
Fix: F-41192r650388_fix
Set policy value for User Configuration -> Administrative Templates -> Microsoft Access 2016 -> Application Settings -> Security -> Trust Center -> "VBA macro Notification Settings" to "Enabled: Disable all with notification".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOAccess999
- Vuln IDs
-
- V-279941
- Rule IDs
-
- SV-279941r1156572_rule
Checks: C-84502r1156570_chk
Access 2016 is no longer supported by the vendor. If the system is running Access 2016, this is a finding.
Fix: F-84407r1156571_fix
Upgrade to a supported version.