Microsoft Excel 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +41 −41
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 41
- V-238155 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-238156 Medium Open/Save actions for Excel 4 macrosheets and add-in files must be blocked.
- V-238157 Medium Open/Save actions for Excel 4 workbooks must be blocked.
- V-238158 Medium Open/Save actions for Excel 4 worksheets must be blocked.
- V-238159 Medium Actions for Excel 95 workbooks must be configured to edit in Protected View.
- V-238160 Medium Actions for Excel 95-97 workbooks and templates must be configured to edit in Protected View.
- V-238161 Medium Blocking as default file block opening behavior must be enforced.
- V-238162 Medium Enabling IE Bind to Object functionality must be present.
- V-238163 Medium Open/Save actions for Dif and Sylk files must be blocked.
- V-238164 Medium Open/Save actions for Excel 2 macrosheets and add-in files must be blocked.
- V-238165 Medium Open/Save actions for Excel 2 worksheets must be blocked.
- V-238166 Medium Open/Save actions for Excel 3 macrosheets and add-in files must be blocked.
- V-238167 Medium Open/Save actions for Excel 3 worksheets must be blocked.
- V-238168 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-238169 Medium Configuration for file validation must be enforced.
- V-238170 Medium Open/Save actions for web pages and Excel 2003 XML spreadsheets must be blocked.
- V-238171 Medium Files from the Internet zone must be opened in Protected View.
- V-238172 Medium Open/Save actions for dBase III / IV files must be blocked.
- V-238173 Medium Navigation to URLs embedded in Office products must be blocked.
- V-238174 Medium Scripted Window Security must be enforced.
- V-238175 Medium Add-on Management functionality must be allowed.
- V-238176 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-238177 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-238178 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-238179 Medium File Downloads must be configured for proper restrictions.
- V-238180 Medium All automatic loading from trusted locations must be disabled.
- V-238181 Medium Disallowance of trusted locations on the network must be enforced.
- V-238182 Medium The Save commands default file format must be configured.
- V-238183 Medium The scanning of encrypted macros in open XML documents must be enforced.
- V-238184 Medium Macro storage must be in personal macro workbooks.
- V-238185 Medium Trust access for VBA must be disallowed.
- V-238186 Medium Protection from zone elevation must be enforced.
- V-238187 Medium ActiveX Installs must be configured for proper restriction.
- V-238188 Medium Files in unsafe locations must be opened in Protected View.
- V-238189 Medium Document behavior if file validation fails must be set.
- V-238190 Medium Excel attachments opened from Outlook must be in Protected View.
- V-238191 Medium Warning Bar settings for VBA macros must be configured.
- V-238192 Medium WEBSERVICE functions must be disabled.
- V-238193 Medium Corrupt workbook options must be disallowed.
- V-238194 Medium Macros must be blocked from running in Office files from the Internet.
- V-238195 Medium Files on local Intranet UNC must be opened in Protected View.
Removed rules 41
- V-70955 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-70957 Medium Open/Save actions for Excel 4 macrosheets and add-in files must be blocked.
- V-70959 Medium Open/Save actions for Excel 4 workbooks must be blocked.
- V-70961 Medium Open/Save actions for Excel 4 worksheets must be blocked.
- V-70963 Medium Actions for Excel 95 workbooks must be configured to edit in Protected View.
- V-70965 Medium Actions for Excel 95-97 workbooks and templates must be configured to edit in Protected View.
- V-70967 Medium Blocking as default file block opening behavior must be enforced.
- V-70969 Medium Enabling IE Bind to Object functionality must be present.
- V-70971 Medium Open/Save actions for Dif and Sylk files must be blocked.
- V-70973 Medium Open/Save actions for Excel 2 macrosheets and add-in files must be blocked.
- V-70975 Medium Open/Save actions for Excel 2 worksheets must be blocked.
- V-70977 Medium Open/Save actions for Excel 3 macrosheets and add-in files must be blocked.
- V-70979 Medium Open/Save actions for Excel 3 worksheets must be blocked.
- V-70981 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-70983 Medium Configuration for file validation must be enforced.
- V-70985 Medium Open/Save actions for web pages and Excel 2003 XML spreadsheets must be blocked.
- V-70987 Medium Files from the Internet zone must be opened in Protected View.
- V-70989 Medium Open/Save actions for dBase III / IV files must be blocked.
- V-70991 Medium Navigation to URLs embedded in Office products must be blocked.
- V-70993 Medium Scripted Window Security must be enforced.
- V-70995 Medium Add-on Management functionality must be allowed.
- V-70997 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-70999 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-71001 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-71003 Medium File Downloads must be configured for proper restrictions.
- V-71005 Medium All automatic loading from trusted locations must be disabled.
- V-71007 Medium Disallowance of trusted locations on the network must be enforced.
- V-71011 Medium The Save commands default file format must be configured.
- V-71015 Medium The scanning of encrypted macros in open XML documents must be enforced.
- V-71017 Medium Macro storage must be in personal macro workbooks.
- V-71019 Medium Trust access for VBA must be disallowed.
- V-71023 Medium Protection from zone elevation must be enforced.
- V-71025 Medium ActiveX Installs must be configured for proper restriction.
- V-71027 Medium Files in unsafe locations must be opened in Protected View.
- V-71029 Medium Document behavior if file validation fails must be set.
- V-71031 Medium Excel attachments opened from Outlook must be in Protected View.
- V-71033 Medium Warning Bar settings for VBA macros must be configured.
- V-71035 Medium WEBSERVICE functions must be disabled.
- V-71037 Medium Corrupt workbook options must be disallowed.
- V-71039 Medium Macros must be blocked from running in Office files from the Internet.
- V-71639 Medium Files on local Intranet UNC must be opened in Protected View.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-238155
- V-70955
- Rule IDs
-
- SV-238155r879630_rule
- SV-85579
Checks: C-41365r652396_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41324r652397_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO105
- Vuln IDs
-
- V-238156
- V-70957
- Rule IDs
-
- SV-238156r879628_rule
- SV-85581
Checks: C-41366r652399_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 4 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL4Macros is REG_DWORD = 2, this is not a finding.
Fix: F-41325r652400_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 4 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO106
- Vuln IDs
-
- V-238157
- V-70959
- Rule IDs
-
- SV-238157r879628_rule
- SV-85583
Checks: C-41367r652402_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 4 workbooks" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL4Workbooks is REG_DWORD = 2, this is not a finding.
Fix: F-41326r652403_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 4 workbooks" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO107
- Vuln IDs
-
- V-238158
- V-70961
- Rule IDs
-
- SV-238158r879628_rule
- SV-85585
Checks: C-41368r652405_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 4 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL4Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-41327r652406_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 4 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO108
- Vuln IDs
-
- V-238159
- V-70963
- Rule IDs
-
- SV-238159r879628_rule
- SV-85587
Checks: C-41369r652408_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 95 workbooks" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL95Workbooks is REG_DWORD = 5, this is not a finding.
Fix: F-41328r652409_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 95 workbooks" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO109
- Vuln IDs
-
- V-238160
- V-70965
- Rule IDs
-
- SV-238160r879628_rule
- SV-85589
Checks: C-41370r652411_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 95-97 workbooks and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\office\16.0\excel\security\fileblock Criteria: If the value XL9597WorkbooksandTemplates is REG_DWORD = 5, this is not a finding.
Fix: F-41329r652412_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 95-97 workbooks and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO110
- Vuln IDs
-
- V-238161
- V-70967
- Rule IDs
-
- SV-238161r879628_rule
- SV-85591
Checks: C-41371r652414_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-41330r652415_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-238162
- V-70969
- Rule IDs
-
- SV-238162r879573_rule
- SV-85593
Checks: C-41372r652417_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41331r652418_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO112
- Vuln IDs
-
- V-238163
- V-70971
- Rule IDs
-
- SV-238163r879628_rule
- SV-85595
Checks: C-41373r652420_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Dif and Sylk files" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value DifandSylkFiles is REG_DWORD = 2, this is not a finding.
Fix: F-41332r652421_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Dif and Sylk files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO113
- Vuln IDs
-
- V-238164
- V-70973
- Rule IDs
-
- SV-238164r879628_rule
- SV-85597
Checks: C-41374r652423_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 2 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL2Macros is REG_DWORD = 2, this is not a finding.
Fix: F-41333r652424_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 2 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO114
- Vuln IDs
-
- V-238165
- V-70975
- Rule IDs
-
- SV-238165r879628_rule
- SV-85599
Checks: C-41375r652426_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 2 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL2Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-41334r652427_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 2 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO115
- Vuln IDs
-
- V-238166
- V-70977
- Rule IDs
-
- SV-238166r879628_rule
- SV-85601
Checks: C-41376r652429_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 3 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL3Macros is REG_DWORD = 2, this is not a finding.
Fix: F-41335r652430_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 3 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO116
- Vuln IDs
-
- V-238167
- V-70979
- Rule IDs
-
- SV-238167r879628_rule
- SV-85603
Checks: C-41377r652432_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 3 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value XL3Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-41336r652433_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Excel 3 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-238168
- V-70981
- Rule IDs
-
- SV-238168r879630_rule
- SV-85605
Checks: C-41378r652435_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41337r652436_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO119
- Vuln IDs
-
- V-238169
- V-70983
- Rule IDs
-
- SV-238169r879573_rule
- SV-85607
Checks: C-41379r652438_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security "Turn off file validation" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\filevalidation Criteria: If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-41338r652439_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO120
- Vuln IDs
-
- V-238170
- V-70985
- Rule IDs
-
- SV-238170r879628_rule
- SV-85609
Checks: C-41380r652441_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Web pages and Excel 2003 XML spreadsheets" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value HtmlandXmlssFiles is REG_DWORD = 2, this is not a finding.
Fix: F-41339r652442_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "Web pages and Excel 2003 XML spreadsheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO121
- Vuln IDs
-
- V-238171
- V-70987
- Rule IDs
-
- SV-238171r879628_rule
- SV-85611
Checks: C-41381r652444_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" is set to "Not Configured" or "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\protectedview Criteria: If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, then this is a finding.
Fix: F-41340r652445_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" to "Not Configured" or "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO122
- Vuln IDs
-
- V-238172
- V-70989
- Rule IDs
-
- SV-238172r879628_rule
- SV-85613
Checks: C-41382r652447_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "dBase III / IV files" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Criteria: If the value DBaseFiles is REG_DWORD = 2, this is not a finding.
Fix: F-41341r652448_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> File Block Settings "dBase III / IV files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-238173
- V-70991
- Rule IDs
-
- SV-238173r879630_rule
- SV-85615
Checks: C-41383r652450_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41342r652451_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-238174
- V-70993
- Rule IDs
-
- SV-238174r879573_rule
- SV-85617
Checks: C-41384r652453_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41343r652454_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-238175
- V-70995
- Rule IDs
-
- SV-238175r879628_rule
- SV-85619
Checks: C-41385r652456_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41344r652457_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-238176
- V-70997
- Rule IDs
-
- SV-238176r879584_rule
- SV-85621
Checks: C-41386r652459_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-41345r652460_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-238177
- V-70999
- Rule IDs
-
- SV-238177r879628_rule
- SV-85623
Checks: C-41387r652462_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41346r652463_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-238178
- V-71001
- Rule IDs
-
- SV-238178r879584_rule
- SV-85625
Checks: C-41388r652465_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-41347r652466_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-238179
- V-71003
- Rule IDs
-
- SV-238179r879629_rule
- SV-85627
Checks: C-41389r652468_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41348r652469_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO133
- Vuln IDs
-
- V-238180
- V-71005
- Rule IDs
-
- SV-238180r879630_rule
- SV-85629
Checks: C-41390r652471_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-41349r652472_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO134
- Vuln IDs
-
- V-238181
- V-71007
- Rule IDs
-
- SV-238181r879630_rule
- SV-85631
Checks: C-41391r652474_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\trusted locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-41350r652475_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO139
- Vuln IDs
-
- V-238182
- V-71011
- Rule IDs
-
- SV-238182r879587_rule
- SV-85635
Checks: C-41392r652477_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Save "default file format" is set to "Enabled: (Excel Workbook *.xlsx)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\options Criteria: If the value DefaultFormat is REG_DWORD = 0x00000033(hex) or 51 (Decimal), this is not a finding.
Fix: F-41351r652478_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Save "default file format" to "Enabled: (Excel Workbook *.xlsx)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO142
- Vuln IDs
-
- V-238183
- V-71015
- Rule IDs
-
- SV-238183r879630_rule
- SV-85639
Checks: C-41393r652480_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security "Scan encrypted macros in Excel Open XML workbooks" is set to "Disabled". The option 'Enabled: Scan encrypted macros (default)' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security Criteria: If the value ExcelBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-41352r652481_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security "Scan encrypted macros in Excel Open XML workbooks" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO145
- Vuln IDs
-
- V-238184
- V-71017
- Rule IDs
-
- SV-238184r879630_rule
- SV-85641
Checks: C-41394r652483_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Store macro in Personal Macro Workbook by default" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\options\binaryoptions Criteria: If the value fGlobalSheet_37_1 is REG_DWORD = 1, this is not a finding.
Fix: F-41353r652484_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Store macro in Personal Macro Workbook by default" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO146
- Vuln IDs
-
- V-238185
- V-71019
- Rule IDs
-
- SV-238185r879587_rule
- SV-85643
Checks: C-41395r652486_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Trust access to Visual Basic Project" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security Criteria: If the value AccessVBOM is REG_DWORD = 0, this is not a finding.
Fix: F-41354r652487_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Trust access to Visual Basic Project" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-238186
- V-71023
- Rule IDs
-
- SV-238186r879573_rule
- SV-85647
Checks: C-41396r652489_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41355r652490_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-238187
- V-71025
- Rule IDs
-
- SV-238187r879859_rule
- SV-85649
Checks: C-41397r652492_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41356r652493_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'excel.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO288
- Vuln IDs
-
- V-238188
- V-71027
- Rule IDs
-
- SV-238188r879630_rule
- SV-85651
Checks: C-41398r652495_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" is set to "Not Configured" or "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\protectedview Criteria: If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, then this is a finding.
Fix: F-41357r652496_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" to "Not Configured" or "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO292
- Vuln IDs
-
- V-238189
- V-71029
- Rule IDs
-
- SV-238189r879630_rule
- SV-85653
Checks: C-41399r652498_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" is set to "Disabled". The option 'Enabled: Open in Protected View' and Unchecked for 'Do not allow edit' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\filevalidation Criteria: If the value openinprotectedview does not exist, this is not a finding. If the value is REG_DWORD = 1, this is not a finding. If the value DisableEditFromPV is set to REG_DWORD = 1, this is not a finding. If the value is set to REG_DWORD = 0, this is a finding.
Fix: F-41358r652499_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO293
- Vuln IDs
-
- V-238190
- V-71031
- Rule IDs
-
- SV-238190r879630_rule
- SV-85655
Checks: C-41400r652501_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Excel\security\protectedview Criteria: If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-41359r652502_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-238191
- V-71033
- Rule IDs
-
- SV-238191r953843_rule
- SV-85657
Checks: C-41401r953841_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Macro Notification Settings is set to "Enabled: Disable VBA macros with notification". The options "Enabled: Disable VBA macros except digitally signed macros" and "Enabled: Disable VBA macros without notification" are more restrictive and also acceptable values. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\excel\security If the value "vbawarnings" is "REG_DWORD = 2", this is not a finding. Values of "REG_DWORD = 3" or "REG_DWORD = 4" are also acceptable. If the registry key does not exist or the value is "REG_DWORD = 1", this is a finding.
Fix: F-41360r953842_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center "Macro Notification Settings" to "Enabled: Disable VBA macros with notification".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO418
- Vuln IDs
-
- V-238192
- V-71035
- Rule IDs
-
- SV-238192r879628_rule
- SV-85659
Checks: C-41402r652507_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> "WEBSERVICE Function Notification Settings" is set to "Disabled". The option 'Enabled: Disable all with notification' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\excel\security Criteria: If the value webservicefunctionwarnings does not exist, this is not a finding. If the registry key exists and is set to REG_DWORD = 1, this is also an acceptable value. If the value is REG_DWORD = 0 or 2, then this is a finding.
Fix: F-41361r652508_fix
Set policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> "WEBSERVICE Function Notification Settings" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO419
- Vuln IDs
-
- V-238193
- V-71037
- Rule IDs
-
- SV-238193r879628_rule
- SV-85661
Checks: C-41403r652510_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Data Recovery -> "Do not show data extraction options when opening corrupt workbooks" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\excel\options Criteria: If the value extractdatadisableui is REG_DWORD = 1, this is not a finding.
Fix: F-41362r652511_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Data Recovery -> "Do not show data extraction options when opening corrupt workbooks" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO600
- Vuln IDs
-
- V-238194
- V-71039
- Rule IDs
-
- SV-238194r879630_rule
- SV-85663
Checks: C-41404r652513_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security Criteria: If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-41363r652514_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO605
- Vuln IDs
-
- V-238195
- V-71639
- Rule IDs
-
- SV-238195r879630_rule
- SV-86263
Checks: C-41405r652516_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Open files on local Intranet UNC in Protected View" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\protectedview Criteria: If the value DisableIntranetCheck is REG_DWORD = 0, this is not a finding.
Fix: F-41364r652517_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Excel Options -> Security -> Trust Center -> Protected View "Open files on local Intranet UNC in Protected View" to "Enabled".