Microsoft Office 365 ProPlus Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +139 −139
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 139
- V-223280 Medium Macros must be blocked from running in Access files from the Internet.
- V-223281 Medium Trust Bar Notifications for unsigned application add-ins in Access must be disabled and blocked.
- V-223282 Medium VBA Macros not digitally signed must be blocked in Access.
- V-223283 Medium Allowing Trusted Locations on the network must be disabled in Access.
- V-223284 Medium The Macro Runtime Scan Scope must be enabled for all documents.
- V-223285 Medium Document metadata for rights managed Office Open XML files must be protected.
- V-223286 Medium The Office client must be prevented from polling the SharePoint Server for published links.
- V-223287 Medium Custom user interface (UI) code must be blocked from loading in all Office applications.
- V-223288 Medium ActiveX Controls must be initialized in Safe Mode.
- V-223289 Medium Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.
- V-223290 Medium Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.
- V-223291 Medium Office applications must be configured to specify encryption type in password-protected Office 97-2003 files.
- V-223292 Medium Office applications must be configured to specify encryption type in password-protected Office Open XML files.
- V-223293 Medium Users must be prevented from creating new trusted locations in the Trust Center.
- V-223294 Medium Office applications must not load XML expansion packs with Smart Documents.
- V-223295 Medium The load of controls in Forms3 must be blocked.
- V-223296 Medium Add-on Management must be enabled for all Office 365 ProPlus programs.
- V-223297 Medium Consistent MIME handling must be enabled for all Office 365 ProPlus programs.
- V-223298 Medium User name and password must be disabled in all Office programs.
- V-223299 Medium The Information Bar must be enabled in all Office programs.
- V-223300 Medium The Local Machine Zone Lockdown Security must be enabled in all Office programs.
- V-223301 Medium The MIME Sniffing safety feature must be enabled in all Office programs.
- V-223302 Medium Navigate URL must be enabled in all Office programs.
- V-223303 Medium Object Caching Protection must be enabled in all Office programs.
- V-223304 Medium Protection from zone elevation must be enabled in all Office programs.
- V-223305 Medium ActiveX installation restriction must be enabled in all Office programs.
- V-223306 Medium File Download Restriction must be enabled in all Office programs.
- V-223307 Medium The Save from URL feature must be enabled in all Office programs.
- V-223308 Medium Scripted Windows Security restrictions must be enabled in all Office programs.
- V-223309 Medium Flash player activation must be disabled in all Office programs.
- V-223310 Medium Trusted Locations on the network must be disabled in Excel.
- V-223311 Medium VBA Macros not digitally signed must be blocked in Excel.
- V-223312 Medium Dynamic Data Exchange (DDE) server launch in Excel must be blocked.
- V-223313 Medium Dynamic Data Exchange (DDE) server lookup in Excel must be blocked.
- V-223314 Medium Open/save of dBase III / IV format files must be blocked.
- V-223315 Medium Open/save of Dif and Sylk format files must be blocked.
- V-223316 Medium Open/save of Excel 2 macrosheets and add-in files must be blocked.
- V-223317 Medium Open/save of Excel 2 worksheets must be blocked.
- V-223318 Medium Open/save of Excel 3 macrosheets and add-in files must be blocked.
- V-223319 Medium Open/save of Excel 3 worksheets must be blocked.
- V-223320 Medium Open/save of Excel 4 macrosheets and add-in files must be blocked.
- V-223321 Medium Open/save of Excel 4 workbooks must be blocked.
- V-223322 Medium Open/save of Excel 4 worksheets must be blocked.
- V-223323 Medium Open/save of Excel 95 workbooks must be blocked.
- V-223324 Medium Open/save of Excel 95-97 workbooks and templates must be blocked.
- V-223325 Medium The default file block behavior must be set to not open blocked files in Excel.
- V-223326 Medium Open/save of Web pages and Excel 2003 XML spreadsheets must be blocked.
- V-223327 Medium Extraction options must be blocked when opening corrupt Excel workbooks.
- V-223328 Medium Updating of links in Excel must be prompted and not automatic.
- V-223329 Medium Loading of pictures from Web pages not created in Excel must be disabled.
- V-223330 Medium AutoRepublish in Excel must be disabled.
- V-223331 Medium AutoRepublish warning alert in Excel must be enabled.
- V-223332 Medium File extensions must be enabled to match file types in Excel.
- V-223333 Medium Scan of encrypted macros in Excel Open XML workbooks must be enabled.
- V-223334 Medium File validation in Excel must be enabled.
- V-223335 Medium WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.
- V-223336 Medium Macros must be blocked from running in Excel files from the Internet.
- V-223337 Medium Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked.
- V-223338 Medium Untrusted Microsoft Query files must be blocked from opening in Excel.
- V-223339 Medium Untrusted database files must be opened in Excel in Protected View mode.
- V-223340 Medium Files from Internet zone must be opened in Excel in Protected View mode.
- V-223341 Medium Files from unsafe locations must be opened in Excel in Protected View mode.
- V-223342 Medium Files failing file validation must be opened in Excel in Protected view mode and disallow edits.
- V-223343 Medium File attachments from Outlook must be opened in Excel in Protected mode.
- V-223344 Medium The SIP security mode in Lync must be enabled.
- V-223345 Medium The HTTP fallback for SIP connection in Lync must be disabled.
- V-223346 Medium The Exchange client authentication with Exchange servers must be enabled to use Kerberos Password Authentication.
- V-223347 Medium Outlook must use remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers.
- V-223348 Medium Scripts associated with public folders must be prevented from execution in Outlook.
- V-223349 Medium Scripts associated with shared folders must be prevented from execution in Outlook.
- V-223350 Medium Files dragged from an Outlook e-mail to the file system must be created in ANSI format.
- V-223351 Medium Junk e-mail level must be enabled at a setting of High.
- V-223352 Medium Active X One-Off forms must only be enabled to load with Outlook Controls.
- V-223353 Medium Outlook must be configured to prevent users overriding attachment security settings.
- V-223354 Medium Internet must not be included in Safe Zone for picture download in Outlook.
- V-223355 Medium The Publish to Global Address List (GAL) button must be disabled in Outlook.
- V-223356 Medium The minimum encryption key length in Outlook must be at least 168.
- V-223357 Medium The warning about invalid digital signatures must be enabled to warn Outlook users.
- V-223358 Medium Outlook must be configured to allow retrieving of Certificate Revocation Lists (CRLs) always when online.
- V-223359 Medium The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.
- V-223360 Medium The ability to demote attachments from Level 2 to Level 1 must be disabled.
- V-223361 Medium The display of Level 1 attachments must be disabled in Outlook.
- V-223362 Medium Level 1 file attachments must be blocked from being delivered.
- V-223363 Medium Level 2 file attachments must be blocked from being delivered.
- V-223364 Medium Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.
- V-223365 Medium When a custom action is executed that uses the Outlook object model, Outlook must automatically deny it.
- V-223366 Medium When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it.
- V-223367 Medium When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.
- V-223368 Medium When an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it.
- V-223369 Medium When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.
- V-223370 Medium When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.
- V-223371 Medium When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.
- V-223372 Medium Outlook must be configured to not allow hyperlinks in suspected phishing messages.
- V-223373 Medium The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.
- V-223374 Medium Trusted Locations on the network must be disabled in Project.
- V-223375 Medium Project must automatically disable unsigned add-ins without informing users.
- V-223376 Medium VBA Macros not digitally signed must be blocked in Project.
- V-223377 Medium VBA Macros not digitally signed must be blocked in PowerPoint.
- V-223378 Medium The ability to run programs from PowerPoint must be disabled.
- V-223379 Medium Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.
- V-223380 Medium The default file block behavior must be set to not open blocked files in PowerPoint.
- V-223381 Medium Encrypted macros in PowerPoint Open XML presentations must be scanned.
- V-223382 Medium File validation in PowerPoint must be enabled.
- V-223383 Medium Macros from the Internet must be blocked from running in PowerPoint.
- V-223384 Medium Unsigned add-ins in PowerPoint must be blocked with no Trust Bar Notification to the user.
- V-223385 Medium Files downloaded from the Internet must be opened in Protected view in PowerPoint.
- V-223386 Medium PowerPoint attachments opened from Outlook must be in Protected View.
- V-223387 Medium Files in unsafe locations must be opened in Protected view in PowerPoint.
- V-223388 Medium If file validation fails, files must be opened in Protected view in PowerPoint with ability to edit disabled.
- V-223389 Medium The use of network locations must be ignored in PowerPoint.
- V-223390 Medium Publisher must be configured to prompt the user when another application programmatically opens a macro.
- V-223391 Medium Publisher must automatically disable unsigned add-ins without informing users.
- V-223392 Medium Publisher must disable all unsigned VBA macros.
- V-223393 Medium VBA Macros not digitally signed must be blocked in Visio.
- V-223394 Medium Trusted Locations on the network must be disabled in Visio.
- V-223395 Medium Visio must automatically disable unsigned add-ins without informing users.
- V-223396 Medium Visio 2000-2002 Binary Drawings, Templates and Stencils must be blocked.
- V-223397 Medium Visio 2003-2010 Binary Drawings, Templates and Stencils must be blocked.
- V-223398 Medium Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.
- V-223399 Medium Macros must be blocked from running in Visio files from the Internet.
- V-223400 Medium Word must automatically disable unsigned add-ins without informing users.
- V-223401 Medium In Word, encrypted macros must be scanned.
- V-223402 Medium Files downloaded from the Internet must be opened in Protected view in Word.
- V-223403 Medium Files located in unsafe locations must be opened in Protected view in Word.
- V-223404 Medium If file validation fails, files must be opened in Protected view in Word with ability to edit disabled.
- V-223405 Medium Word attachments opened from Outlook must be in Protected View.
- V-223406 Medium The default file block behavior must be set to not open blocked files in Word.
- V-223407 Medium Open/Save of Word 2 and earlier binary documents and templates must be blocked.
- V-223408 Medium Open/Save of Word 2000 binary documents and templates must be blocked.
- V-223409 Medium Open/Save of Word 2003 binary documents and templates must be blocked.
- V-223410 Medium Open/Save of Word 2007 and later binary documents and templates must be blocked.
- V-223411 Medium Open/Save of Word 6.0 binary documents and templates must be blocked.
- V-223412 Medium Open/Save of Word 95 binary documents and templates must be blocked.
- V-223413 Medium Open/Save of Word 97 binary documents and templates must be blocked.
- V-223414 Medium Open/Save of Word XP binary documents and templates must be blocked.
- V-223415 Medium In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center.
- V-223416 Medium Trusted Locations on the network must be disabled in Word.
- V-223417 Medium VBA Macros not digitally signed must be blocked in Word.
- V-223418 Medium File validation in Word must be enabled.
Removed rules 139
- V-100517 Medium File validation in Word must be enabled.
- V-99633 Medium Macros must be blocked from running in Access files from the Internet.
- V-99635 Medium Trust Bar Notifications for unsigned application add-ins in Access must be disabled and blocked.
- V-99637 Medium VBA Macros not digitally signed must be blocked in Access.
- V-99639 Medium Allowing Trusted Locations on the network must be disabled in Access.
- V-99641 Medium The Macro Runtime Scan Scope must be enabled for all documents.
- V-99643 Medium Document metadata for rights managed Office Open XML files must be protected.
- V-99645 Medium The Office client must be prevented from polling the SharePoint Server for published links.
- V-99647 Medium Custom user interface (UI) code must be blocked from loading in all Office applications.
- V-99649 Medium ActiveX Controls must be initialized in Safe Mode.
- V-99651 Medium Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.
- V-99653 Medium Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.
- V-99655 Medium Office applications must be configured to specify encryption type in password-protected Office 97-2003 files.
- V-99657 Medium Office applications must be configured to specify encryption type in password-protected Office Open XML files.
- V-99659 Medium Users must be prevented from creating new trusted locations in the Trust Center.
- V-99663 Medium Office applications must not load XML expansion packs with Smart Documents.
- V-99665 Medium The load of controls in Forms3 must be blocked.
- V-99667 Medium Add-on Management must be enabled for all Office 365 ProPlus programs.
- V-99669 Medium Consistent MIME handling must be enabled for all Office 365 ProPlus programs.
- V-99671 Medium User name and password must be disabled in all Office programs.
- V-99673 Medium The Information Bar must be enabled in all Office programs.
- V-99675 Medium The Local Machine Zone Lockdown Security must be enabled in all Office programs.
- V-99677 Medium The MIME Sniffing safety feature must be enabled in all Office programs.
- V-99679 Medium Navigate URL must be enabled in all Office programs.
- V-99681 Medium Object Caching Protection must be enabled in all Office programs.
- V-99683 Medium Protection from zone elevation must be enabled in all Office programs.
- V-99685 Medium ActiveX installation restriction must be enabled in all Office programs.
- V-99687 Medium File Download Restriction must be enabled in all Office programs.
- V-99689 Medium The Save from URL feature must be enabled in all Office programs.
- V-99691 Medium Scripted Windows Security restrictions must be enabled in all Office programs.
- V-99693 Medium Flash player activation must be disabled in all Office programs.
- V-99695 Medium Trusted Locations on the network must be disabled in Excel.
- V-99697 Medium VBA Macros not digitally signed must be blocked in Excel.
- V-99699 Medium Dynamic Data Exchange (DDE) server launch in Excel must be blocked.
- V-99701 Medium Dynamic Data Exchange (DDE) server lookup in Excel must be blocked.
- V-99703 Medium Open/save of dBase III / IV format files must be blocked.
- V-99705 Medium Open/save of Dif and Sylk format files must be blocked.
- V-99707 Medium Open/save of Excel 2 macrosheets and add-in files must be blocked.
- V-99709 Medium Open/save of Excel 2 worksheets must be blocked.
- V-99711 Medium Open/save of Excel 3 macrosheets and add-in files must be blocked.
- V-99713 Medium Open/save of Excel 3 worksheets must be blocked.
- V-99715 Medium Open/save of Excel 4 macrosheets and add-in files must be blocked.
- V-99717 Medium Open/save of Excel 4 workbooks must be blocked.
- V-99719 Medium Open/save of Excel 4 worksheets must be blocked.
- V-99721 Medium Open/save of Excel 95 workbooks must be blocked.
- V-99723 Medium Open/save of Excel 95-97 workbooks and templates must be blocked.
- V-99725 Medium The default file block behavior must be set to not open blocked files in Excel.
- V-99727 Medium Open/save of Web pages and Excel 2003 XML spreadsheets must be blocked.
- V-99729 Medium Extraction options must be blocked when opening corrupt Excel workbooks.
- V-99731 Medium Updating of links in Excel must be prompted and not automatic.
- V-99733 Medium Loading of pictures from Web pages not created in Excel must be disabled.
- V-99735 Medium AutoRepublish in Excel must be disabled.
- V-99737 Medium AutoRepublish warning alert in Excel must be enabled.
- V-99739 Medium File extensions must be enabled to match file types in Excel.
- V-99741 Medium Scan of encrypted macros in Excel Open XML workbooks must be enabled.
- V-99743 Medium File validation in Excel must be enabled.
- V-99745 Medium WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.
- V-99747 Medium Macros must be blocked from running in Excel files from the Internet.
- V-99749 Medium Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked.
- V-99751 Medium Untrusted Microsoft Query files must be blocked from opening in Excel.
- V-99753 Medium Untrusted database files must be opened in Excel in Protected View mode.
- V-99755 Medium Files from Internet zone must be opened in Excel in Protected View mode.
- V-99757 Medium Files from unsafe locations must be opened in Excel in Protected View mode.
- V-99759 Medium Files failing file validation must be opened in Excel in Protected view mode and disallow edits.
- V-99761 Medium File attachments from Outlook must be opened in Excel in Protected mode.
- V-99763 Medium The SIP security mode in Lync must be enabled.
- V-99765 Medium The HTTP fallback for SIP connection in Lync must be disabled.
- V-99767 Medium The Exchange client authentication with Exchange servers must be enabled to use Kerberos Password Authentication.
- V-99769 Medium Outlook must use remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers.
- V-99771 Medium Scripts associated with public folders must be prevented from execution in Outlook.
- V-99773 Medium Scripts associated with shared folders must be prevented from execution in Outlook.
- V-99775 Medium Files dragged from an Outlook e-mail to the file system must be created in ANSI format.
- V-99777 Medium Junk e-mail level must be enabled at a setting of High.
- V-99779 Medium Active X One-Off forms must only be enabled to load with Outlook Controls.
- V-99781 Medium Outlook must be configured to prevent users overriding attachment security settings.
- V-99783 Medium Internet must not be included in Safe Zone for picture download in Outlook.
- V-99785 Medium The Publish to Global Address List (GAL) button must be disabled in Outlook.
- V-99787 Medium The minimum encryption key length in Outlook must be at least 168.
- V-99789 Medium The warning about invalid digital signatures must be enabled to warn Outlook users.
- V-99791 Medium Outlook must be configured to allow retrieving of Certificate Revocation Lists (CRLs) always when online.
- V-99793 Medium The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.
- V-99795 Medium The ability to demote attachments from Level 2 to Level 1 must be disabled.
- V-99797 Medium The display of Level 1 attachments must be disabled in Outlook.
- V-99799 Medium Level 1 file attachments must be blocked from being delivered.
- V-99801 Medium Level 2 file attachments must be blocked from being delivered.
- V-99803 Medium Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.
- V-99805 Medium When a custom action is executed that uses the Outlook object model, Outlook must automatically deny it.
- V-99807 Medium When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it.
- V-99809 Medium When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.
- V-99811 Medium When an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it.
- V-99813 Medium When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.
- V-99815 Medium When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.
- V-99817 Medium When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.
- V-99819 Medium Outlook must be configured to not allow hyperlinks in suspected phishing messages.
- V-99821 Medium The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.
- V-99825 Medium VBA Macros not digitally signed must be blocked in PowerPoint.
- V-99827 Medium The ability to run programs from PowerPoint must be disabled.
- V-99829 Medium Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.
- V-99831 Medium The default file block behavior must be set to not open blocked files in PowerPoint.
- V-99833 Medium Encrypted macros in PowerPoint Open XML presentations must be scanned.
- V-99835 Medium File validation in PowerPoint must be enabled.
- V-99837 Medium Macros from the Internet must be blocked from running in PowerPoint.
- V-99839 Medium Unsigned add-ins in PowerPoint must be blocked with no Trust Bar Notification to the user.
- V-99841 Medium Files downloaded from the Internet must be opened in Protected view in PowerPoint.
- V-99843 Medium PowerPoint attachments opened from Outlook must be in Protected View.
- V-99845 Medium Files in unsafe locations must be opened in Protected view in PowerPoint.
- V-99847 Medium If file validation fails, files must be opened in Protected view in PowerPoint with ability to edit disabled.
- V-99849 Medium The use of network locations must be ignored in PowerPoint.
- V-99851 Medium Trusted Locations on the network must be disabled in Project.
- V-99853 Medium Project must automatically disable unsigned add-ins without informing users.
- V-99855 Medium VBA Macros not digitally signed must be blocked in Project.
- V-99857 Medium Publisher must be configured to prompt the user when another application programmatically opens a macro.
- V-99859 Medium Publisher must automatically disable unsigned add-ins without informing users.
- V-99861 Medium Publisher must disable all unsigned VBA macros.
- V-99863 Medium VBA Macros not digitally signed must be blocked in Visio.
- V-99865 Medium Trusted Locations on the network must be disabled in Visio.
- V-99867 Medium Visio must automatically disable unsigned add-ins without informing users.
- V-99869 Medium Visio 2000-2002 Binary Drawings, Templates and Stencils must be blocked.
- V-99871 Medium Visio 2003-2010 Binary Drawings, Templates and Stencils must be blocked.
- V-99873 Medium Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.
- V-99875 Medium Macros must be blocked from running in Visio files from the Internet.
- V-99877 Medium Word must automatically disable unsigned add-ins without informing users.
- V-99879 Medium In Word, encrypted macros must be scanned.
- V-99881 Medium Files downloaded from the Internet must be opened in Protected view in Word.
- V-99883 Medium Files located in unsafe locations must be opened in Protected view in Word.
- V-99885 Medium If file validation fails, files must be opened in Protected view in Word with ability to edit disabled.
- V-99887 Medium Word attachments opened from Outlook must be in Protected View.
- V-99889 Medium The default file block behavior must be set to not open blocked files in Word.
- V-99891 Medium Open/Save of Word 2 and earlier binary documents and templates must be blocked.
- V-99893 Medium Open/Save of Word 2000 binary documents and templates must be blocked.
- V-99895 Medium Open/Save of Word 2003 binary documents and templates must be blocked.
- V-99897 Medium Open/Save of Word 2007 and later binary documents and templates must be blocked.
- V-99899 Medium Open/Save of Word 6.0 binary documents and templates must be blocked.
- V-99901 Medium Open/Save of Word 95 binary documents and templates must be blocked.
- V-99903 Medium Open/Save of Word 97 binary documents and templates must be blocked.
- V-99905 Medium Open/Save of Word XP binary documents and templates must be blocked.
- V-99907 Medium In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center.
- V-99909 Medium Trusted Locations on the network must be disabled in Word.
- V-99911 Medium VBA Macros not digitally signed must be blocked in Word.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-AC-000001
- Vuln IDs
-
- V-223280
- V-99633
- Rule IDs
-
- SV-223280r508019_rule
- SV-108737
Checks: C-24953r442059_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-24941r442060_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-AC-000002
- Vuln IDs
-
- V-223281
- V-99635
- Rule IDs
-
- SV-223281r508019_rule
- SV-108739
Checks: C-24954r442062_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-24942r442063_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-AC-000003
- Vuln IDs
-
- V-223282
- V-99637
- Rule IDs
-
- SV-223282r508019_rule
- SV-108741
Checks: C-24955r442065_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 2, this is not a finding. Values of REG_DWORD = 3 or 4 are also acceptable values. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-24943r442066_fix
Set User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-AC-000004
- Vuln IDs
-
- V-223283
- V-99639
- Rule IDs
-
- SV-223283r508019_rule
- SV-108743
Checks: C-24956r442068_chk
Verify the policy for Set the User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> Trusted Locations >> Allow trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\access\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-24944r442069_fix
Set the User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> Trusted Locations >> Allow trusted Locations on the network to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000001
- Vuln IDs
-
- V-223284
- V-99641
- Rule IDs
-
- SV-223284r508192_rule
- SV-108745
Checks: C-24957r508190_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 2, this is not a finding.
Fix: F-24945r442072_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- O365-CO-000002
- Vuln IDs
-
- V-223285
- V-99643
- Rule IDs
-
- SV-223285r508019_rule
- SV-108747
Checks: C-24958r442074_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-24946r442075_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-CO-000003
- Vuln IDs
-
- V-223286
- V-99645
- Rule IDs
-
- SV-223286r538226_rule
- SV-108749
Checks: C-24959r508037_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding.
Fix: F-24947r508038_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000004
- Vuln IDs
-
- V-223287
- V-99647
- Rule IDs
-
- SV-223287r508019_rule
- SV-108751
Checks: C-24960r442080_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding.
Fix: F-24948r442081_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000005
- Vuln IDs
-
- V-223288
- V-99649
- Rule IDs
-
- SV-223288r508019_rule
- SV-108753
Checks: C-24961r442083_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls exists, this is a finding.
Fix: F-24949r442084_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000006
- Vuln IDs
-
- V-223289
- V-99651
- Rule IDs
-
- SV-223289r508019_rule
- SV-108755
Checks: C-24962r442086_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix: F-24950r442087_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-CO-000007
- Vuln IDs
-
- V-223290
- V-99653
- Rule IDs
-
- SV-223290r508019_rule
- SV-108757
Checks: C-24963r442089_chk
Verify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value for trustbar is set to REG_DWORD = 0, this is not a finding.
Fix: F-24951r442090_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- O365-CO-000008
- Vuln IDs
-
- V-223291
- V-99655
- Rule IDs
-
- SV-223291r508019_rule
- SV-108759
Checks: C-24964r442092_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-24952r442093_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- O365-CO-000009
- Vuln IDs
-
- V-223292
- V-99657
- Rule IDs
-
- SV-223292r508019_rule
- SV-108761
Checks: C-24965r442095_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-24953r442096_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- O365-CO-000010
- Vuln IDs
-
- V-223293
- V-99659
- Rule IDs
-
- SV-223293r508019_rule
- SV-108763
Checks: C-24966r442098_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016\Security Settings\Trust Center >> Allow mix of policy and user locations is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security\trusted locations If the value for allow user locations is set to REG_DWORD = 0, this is not a finding.
Fix: F-24954r442099_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Trust Center >> Allow mix of policy and user locations to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000012
- Vuln IDs
-
- V-223294
- V-99663
- Rule IDs
-
- SV-223294r508019_rule
- SV-108767
Checks: C-24967r442101_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\smart tag If the value for neverloadmanifests is REG_DWORD = 1, this is not a finding.
Fix: F-24955r442102_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000013
- Vuln IDs
-
- V-223295
- V-99665
- Rule IDs
-
- SV-223295r508019_rule
- SV-108769
Checks: C-24968r442104_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" is set to "Enabled (For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration.)". Use the Windows Registry Editor to navigate to the following key: HKCU\keycupoliciesmsvbasecurity If the value LoadControlsInForms exists, this is a finding.
Fix: F-24956r442105_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" to "Enabled:1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000014
- Vuln IDs
-
- V-223296
- V-99667
- Rule IDs
-
- SV-223296r508019_rule
- SV-108771
Checks: C-24969r442107_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Add-on Management" is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT If the value for each installed Office Program is REG_DWORD = 1, this is not a finding.
Fix: F-24957r442108_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Add-on Management" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000015
- Vuln IDs
-
- V-223297
- V-99669
- Rule IDs
-
- SV-223297r508019_rule
- SV-108773
Checks: C-24970r442110_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Consistent Mime Handling is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_handling If the value for all installed Office programs is set to "True", this is not a finding.
Fix: F-24958r442111_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Consistent Mime Handling" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000016
- Vuln IDs
-
- V-223298
- V-99671
- Rule IDs
-
- SV-223298r508019_rule
- SV-108775
Checks: C-24971r442113_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24959r442114_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000017
- Vuln IDs
-
- V-223299
- V-99673
- Rule IDs
-
- SV-223299r508019_rule
- SV-108777
Checks: C-24972r442116_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_securityband If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24960r442117_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000018
- Vuln IDs
-
- V-223300
- V-99675
- Rule IDs
-
- SV-223300r508019_rule
- SV-108779
Checks: C-24973r442119_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown Security is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_localmachine_lockdown If the value for all installed Office programs is REG_DWORD = 1, this is not a finding.
Fix: F-24961r442120_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000019
- Vuln IDs
-
- V-223301
- V-99677
- Rule IDs
-
- SV-223301r508019_rule
- SV-108781
Checks: C-24974r442122_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_sniffing If the value for all installed Office Programs is REG_DWORD = 1, this is not a finding.
Fix: F-24962r442123_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature to "Enabled" for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000020
- Vuln IDs
-
- V-223302
- V-99679
- Rule IDs
-
- SV-223302r508019_rule
- SV-108783
Checks: C-24975r442125_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Navigate URL is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_validate_navigate_url If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24963r442126_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Navigate URL to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000021
- Vuln IDs
-
- V-223303
- V-99681
- Rule IDs
-
- SV-223303r508019_rule
- SV-108785
Checks: C-24976r442128_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_object_caching If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24964r442129_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000022
- Vuln IDs
-
- V-223304
- V-99683
- Rule IDs
-
- SV-223304r508019_rule
- SV-108787
Checks: C-24977r442131_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Protection from Zone Elevation is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_zone_elevation If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24965r442132_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Protection from Zone Elevation to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000023
- Vuln IDs
-
- V-223305
- V-99685
- Rule IDs
-
- SV-223305r508019_rule
- SV-108789
Checks: C-24978r442134_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict ActiveX Install is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_restrict_activexinstall If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24966r442135_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict ActiveX Install to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000024
- Vuln IDs
-
- V-223306
- V-99687
- Rule IDs
-
- SV-223306r508019_rule
- SV-108791
Checks: C-24979r442137_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict File Download is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_restrict_filedownload If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24967r442138_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict File Download to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000025
- Vuln IDs
-
- V-223307
- V-99689
- Rule IDs
-
- SV-223307r508019_rule
- SV-108793
Checks: C-24980r442140_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Saved from URL is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_unc_saved If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24968r442141_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Saved from URL to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000026
- Vuln IDs
-
- V-223308
- V-99691
- Rule IDs
-
- SV-223308r508019_rule
- SV-108795
Checks: C-24981r442143_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Scripted Window Security Restrictions is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24969r442144_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >>Scripted Window Security Restrictions to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000027
- Vuln IDs
-
- V-223309
- V-99693
- Rule IDs
-
- SV-223309r508019_rule
- SV-108797
Checks: C-24982r442146_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation is set to "Enabled" Block all activation. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Microsoft\Office\Common\COM Compatibility If the value for COMMENT is REG_DWORD = 1, this is not a finding.
Fix: F-24970r442147_fix
Set the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation to "Enabled" (Block all activation).
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000001
- Vuln IDs
-
- V-223310
- V-99695
- Rule IDs
-
- SV-223310r508019_rule
- SV-108799
Checks: C-24983r442149_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\trusted locations If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-24971r442150_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-EX-000002
- Vuln IDs
-
- V-223311
- V-99697
- Rule IDs
-
- SV-223311r508019_rule
- SV-108801
Checks: C-24984r442152_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Application Settings >> Security >> Trust Center >> "VBA macro Notification Settings" is set to "Enabled" and "Disable all except digitally signed macros" from the Options. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\excel\security If the value vbawarnings is REG_DWORD = 3, this is not a finding.
Fix: F-24972r442153_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Application Settings >> Security >> Trust Center >> "VBA macro Notification Settings" to "Enabled" and "Disable all except digitally signed macros" from the Options.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000003
- Vuln IDs
-
- V-223312
- V-99699
- Rule IDs
-
- SV-223312r508019_rule
- SV-108803
Checks: C-24985r442155_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlaunch" is REG_DWORD = 1, this is not a finding.
Fix: F-24973r442156_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000004
- Vuln IDs
-
- V-223313
- V-99701
- Rule IDs
-
- SV-223313r508019_rule
- SV-108805
Checks: C-24986r442158_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlookup" is REG_DWORD = 1, this is not a finding.
Fix: F-24974r442159_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000005
- Vuln IDs
-
- V-223314
- V-99703
- Rule IDs
-
- SV-223314r508019_rule
- SV-108807
Checks: C-24987r442161_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "dBase III / IV files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value DBaseFiles is REG_DWORD = 2, this is not a finding.
Fix: F-24975r442162_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "dBase III / IV files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000006
- Vuln IDs
-
- V-223315
- V-99705
- Rule IDs
-
- SV-223315r508019_rule
- SV-108809
Checks: C-24988r442164_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Dif and Sylk files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value DifandSylkFiles is REG_DWORD = 2, this is not a finding.
Fix: F-24976r442165_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Dif and Sylk files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000007
- Vuln IDs
-
- V-223316
- V-99707
- Rule IDs
-
- SV-223316r508019_rule
- SV-108811
Checks: C-24989r442167_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL2Macros is REG_DWORD = 2, this is not a finding.
Fix: F-24977r442168_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000008
- Vuln IDs
-
- V-223317
- V-99709
- Rule IDs
-
- SV-223317r508019_rule
- SV-108813
Checks: C-24990r442170_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL2Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-24978r442171_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000009
- Vuln IDs
-
- V-223318
- V-99711
- Rule IDs
-
- SV-223318r508019_rule
- SV-108815
Checks: C-24991r442173_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL3Macros is REG_DWORD = 2, this is not a finding.
Fix: F-24979r442174_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000010
- Vuln IDs
-
- V-223319
- V-99713
- Rule IDs
-
- SV-223319r508019_rule
- SV-108817
Checks: C-24992r442176_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL3Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-24980r442177_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000011
- Vuln IDs
-
- V-223320
- V-99715
- Rule IDs
-
- SV-223320r508019_rule
- SV-108819
Checks: C-24993r442179_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Macros is REG_DWORD = 2, this is not a finding.
Fix: F-24981r442180_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000012
- Vuln IDs
-
- V-223321
- V-99717
- Rule IDs
-
- SV-223321r508019_rule
- SV-108821
Checks: C-24994r442182_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 workbooks" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Workbooks is REG_DWORD = 2, this is not a finding.
Fix: F-24982r442183_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 workbooks" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000013
- Vuln IDs
-
- V-223322
- V-99719
- Rule IDs
-
- SV-223322r508019_rule
- SV-108823
Checks: C-24995r442185_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-24983r442186_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000014
- Vuln IDs
-
- V-223323
- V-99721
- Rule IDs
-
- SV-223323r508019_rule
- SV-108825
Checks: C-24996r442188_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\fileblock If the value for xl9597workbooksandtemplates is REG_DWORD = 2, this is not a finding.
Fix: F-24984r442189_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000015
- Vuln IDs
-
- V-223324
- V-99723
- Rule IDs
-
- SV-223324r508019_rule
- SV-108827
Checks: C-24997r442191_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\office\16.0\excel\security\fileblock If the value XL9597WorkbooksandTemplates is REG_DWORD = 2, this is not a finding.
Fix: F-24985r442192_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000016
- Vuln IDs
-
- V-223325
- V-99725
- Rule IDs
-
- SV-223325r508019_rule
- SV-108829
Checks: C-24998r442194_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Set default file block behavior is set to "Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-24986r442195_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Set default file block behavior to "Enabled:Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000017
- Vuln IDs
-
- V-223326
- V-99727
- Rule IDs
-
- SV-223326r508019_rule
- SV-108831
Checks: C-24999r442197_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Web pages and Excel 2003 XML spreadsheets is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\fileblock If the value for htmlandxmlssfiles is REG_DWORD = 2, this is not a finding.
Fix: F-24987r442198_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Web pages and Excel 2003 XML spreadsheets to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000018
- Vuln IDs
-
- V-223327
- V-99729
- Rule IDs
-
- SV-223327r508019_rule
- SV-108833
Checks: C-25000r442200_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Data Recovery >> Do not show data extraction options when opening corrupt workbooks is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If the value for extractdatadisableui is REG_DWORD = 1, this is not a finding.
Fix: F-24988r442201_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Data Recovery >> Do not show data extraction options when opening corrupt workbooks to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000019
- Vuln IDs
-
- V-223328
- V-99731
- Rule IDs
-
- SV-223328r508019_rule
- SV-108835
Checks: C-25001r442203_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options\binaryoptions If the value for fupdateext_78_1 is REG_DWORD = 1, this is not a finding.
Fix: F-24989r442204_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-EX-000020
- Vuln IDs
-
- V-223329
- V-99733
- Rule IDs
-
- SV-223329r508019_rule
- SV-108837
Checks: C-25002r442206_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General. Load pictures from Web pages not created in Excel is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\internet If the value for donotloadpictures is REG_DWORD = 1, this is not a finding.
Fix: F-24990r442207_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General >> Load pictures from Web pages not created in Excel to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000021
- Vuln IDs
-
- V-223330
- V-99735
- Rule IDs
-
- SV-223330r508019_rule
- SV-108839
Checks: C-25003r442209_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish is to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If the value for disableautorepublish is REG_DWORD = 1, this is not a finding.
Fix: F-24991r442210_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000022
- Vuln IDs
-
- V-223331
- V-99737
- Rule IDs
-
- SV-223331r508019_rule
- SV-108841
Checks: C-25004r442212_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If value for disableautorepublishwarning is REG_DWORD = 1, this is not a finding.
Fix: F-24992r442213_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000023
- Vuln IDs
-
- V-223332
- V-99739
- Rule IDs
-
- SV-223332r508019_rule
- SV-108843
Checks: C-25005r442215_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type is set to "Always match file type". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If value for extensionhardening is REG_DWORD = 1, this is not a finding.
Fix: F-24993r442216_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type to "Always match file type".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000024
- Vuln IDs
-
- V-223333
- V-99741
- Rule IDs
-
- SV-223333r508019_rule
- SV-108845
Checks: C-25006r442218_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Scan encrypted macros in Excel Open XML workbooks is set to "Scan encrypted macros (default)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value excelbypassencryptiedmacrosscan does not exist, this is not a finding. If the value for excelbypassencryptedmacroscan is REG_DWORD = 0, this is not a finding.
Fix: F-24994r442219_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Scan encrypted macros in Excel Open XML workbooks to "Scan encrypted macros (default)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-EX-000025
- Vuln IDs
-
- V-223334
- V-99743
- Rule IDs
-
- SV-223334r508019_rule
- SV-108847
Checks: C-25007r442221_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Turn off file validation is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\filevalidation If the value for enableonload is REG_DWORD = 1, this is not a finding.
Fix: F-24995r442222_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Turn off file validation to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000026
- Vuln IDs
-
- V-223335
- V-99745
- Rule IDs
-
- SV-223335r508019_rule
- SV-108849
Checks: C-25008r442224_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> WEBSERVICE Function Notification Settings is set to "Enabled" and "Disable all with notification". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value webservicefunctionwarnings does not exist, this is not a finding. If the value for webservicefunctionwarnings is REG_DWORD = 1, this is not a finding. If the value for webservicefunctionwarnings is REG_DWORD = 2, this is a finding.
Fix: F-24996r442225_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> WEBSERVICE Function Notification Settings to "Enabled" and "Disable all with notification".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000027
- Vuln IDs
-
- V-223336
- V-99747
- Rule IDs
-
- SV-223336r508019_rule
- SV-108851
Checks: C-25009r442227_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-24997r442228_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-EX-000028
- Vuln IDs
-
- V-223337
- V-99749
- Rule IDs
-
- SV-223337r508019_rule
- SV-108853
Checks: C-25010r442230_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value for notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-24998r442231_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000029
- Vuln IDs
-
- V-223338
- V-99751
- Rule IDs
-
- SV-223338r508019_rule
- SV-108855
Checks: C-25011r442233_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\keycuexcelexternalcontent If the value for enableblockunsecurequeryfiles is Reg_DWORD = 1, this is not a finding.
Fix: F-24999r442234_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000030
- Vuln IDs
-
- V-223339
- V-99753
- Rule IDs
-
- SV-223339r508036_rule
- SV-108857
Checks: C-25012r508034_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Always open untrusted database files in Protected View is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\polices\microsoft\office\16.0\excel\security\protectedview If the value for enabledatabasefileprotectedview is REG_DWORD = 1, this is not a finding.
Fix: F-25000r508035_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Always open untrusted database files in Protected View to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000031
- Vuln IDs
-
- V-223340
- V-99755
- Rule IDs
-
- SV-223340r508019_rule
- SV-108859
Checks: C-25013r442239_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25001r442240_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000032
- Vuln IDs
-
- V-223341
- V-99757
- Rule IDs
-
- SV-223341r508019_rule
- SV-108861
Checks: C-25014r442242_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25002r442243_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000033
- Vuln IDs
-
- V-223342
- V-99759
- Rule IDs
-
- SV-223342r508019_rule
- SV-108863
Checks: C-25015r442245_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Excel\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-25003r442246_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000034
- Vuln IDs
-
- V-223343
- V-99761
- Rule IDs
-
- SV-223343r508019_rule
- SV-108865
Checks: C-25016r442248_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Turn off Protected View for attachments opened from Outlook is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25004r442249_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Turn off Protected View for attachments opened from Outlook to "Disabled".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- O365-LY-000001
- Vuln IDs
-
- V-223344
- V-99763
- Rule IDs
-
- SV-223344r508019_rule
- SV-108867
Checks: C-25017r442251_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Configure SIP security mode" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\16.0\lync If the value enablesiphighsecuritymode is REG_DWORD = 1, this is not a finding.
Fix: F-25005r442252_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Configure SIP security mode" to "Enabled".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- O365-LY-000002
- Vuln IDs
-
- V-223345
- V-99765
- Rule IDs
-
- SV-223345r508019_rule
- SV-108869
Checks: C-25018r442254_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Disable HTTP fallback for SIP connection" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\16.0\lync If the value disablehttpconnect is REG_DWORD = 1, this is not a finding.
Fix: F-25006r442255_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Disable HTTP fallback for SIP connection" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- O365-OU-000001
- Vuln IDs
-
- V-223346
- V-99767
- Rule IDs
-
- SV-223346r508019_rule
- SV-108871
Checks: C-25019r442257_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Authentication with Exchange Server is set to Kerberos Password Authentication. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security!authenticationservice If the value authenticationservice is set to REG_DWORD = 16 (decimal) or 10 (hex), this is not a finding.
Fix: F-25007r442258_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Authentication with Exchange Server to Kerberos Password Authentication.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- O365-OU-000002
- Vuln IDs
-
- V-223347
- V-99769
- Rule IDs
-
- SV-223347r508019_rule
- SV-108873
Checks: C-25020r442260_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Enable RPC encryption is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\rpc If the value for enablerpcencryption is set to REG_DWORD = 1, this is not a finding.
Fix: F-25008r442261_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Enable RPC encryption to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000003
- Vuln IDs
-
- V-223348
- V-99771
- Rule IDs
-
- SV-223348r508019_rule
- SV-108875
Checks: C-25021r442263_chk
Verify the policy for Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for public folders is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for publicfolderscript is set to REG_DWORD = 1, this is not a finding.
Fix: F-25009r442264_fix
Set the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for public folders to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000004
- Vuln IDs
-
- V-223349
- V-99773
- Rule IDs
-
- SV-223349r508019_rule
- SV-108877
Checks: C-25022r442266_chk
Verify the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for shared folders is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for sharedfolderscript is set to REG_DWORD = 1, this is not a finding.
Fix: F-25010r442267_fix
Set the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for shared folders to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000005
- Vuln IDs
-
- V-223350
- V-99775
- Rule IDs
-
- SV-223350r508019_rule
- SV-108879
Checks: C-25023r442269_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system is set to "Disabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\general If the value for msgformat is set to REG_DWORD = 0, this is not a finding.
Fix: F-25011r442270_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000006
- Vuln IDs
-
- V-223351
- V-99777
- Rule IDs
-
- SV-223351r508019_rule
- SV-108881
Checks: C-25024r442272_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Preferences >> Junk E-mail >> Junk E-mail protection level is set to "High". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\mail If the value junkmailprotection is set to "High", this is not a finding.
Fix: F-25012r442273_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Preferences >> Junk E-mail >> Junk E-mail protection level to "High".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000007
- Vuln IDs
-
- V-223352
- V-99779
- Rule IDs
-
- SV-223352r508019_rule
- SV-108883
Checks: C-25025r442275_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Allow Active X One Off Forms is set to "Enabled" "Load only Outlook Controls". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for allowactivexoneoffforms is REG_DWORD = 0, this is not a finding.
Fix: F-25013r442276_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Allow Active X One Off Forms to "Enabled" "Load only Outlook Controls".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- O365-OU-000008
- Vuln IDs
-
- V-223353
- V-99781
- Rule IDs
-
- SV-223353r508019_rule
- SV-108885
Checks: C-25026r442278_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Prevent users from customizing attachment security settings is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook If the value for disallowattachmentcustomization is set to REG_DWORD = 1, this is not a finding.
Fix: F-25014r442279_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Prevent users from customizing attachment security settings to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000009
- Vuln IDs
-
- V-223354
- V-99783
- Rule IDs
-
- SV-223354r508019_rule
- SV-108887
Checks: C-25027r442281_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Automatic Picture Download Settings >> Include Internet in Safe Zones for Automatic Picture Download is set to "Disabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\ microsoft\office\ 16.0\outlook\options\mail If the value for Internet is set to REG_DWORD = 0, this is not a finding.
Fix: F-25015r442282_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Automatic Picture Download Settings >> Include Internet in Safe Zones for Automatic Picture Download to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000010
- Vuln IDs
-
- V-223355
- V-99785
- Rule IDs
-
- SV-223355r508019_rule
- SV-108889
Checks: C-25028r442284_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ outlook\security If the value for publishtogaldisabled is REG_DWORD = 1, this is not a finding.
Fix: F-25016r442285_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button to "Enabled".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- O365-OU-000011
- Vuln IDs
-
- V-223356
- V-99787
- Rule IDs
-
- SV-223356r508019_rule
- SV-108891
Checks: C-25029r442287_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Minimum encryption settings is set to "Enabled" and a Minimum key size (in bits) of "168" or above. Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for minenckey is set to 168 or above, this is not a finding.
Fix: F-25017r442288_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Minimum encryption settings to "Enabled"and a Minimum key size (in bits) of "168" or above.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000012
- Vuln IDs
-
- V-223357
- V-99789
- Rule IDs
-
- SV-223357r508019_rule
- SV-108893
Checks: C-25030r442290_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning is set to "Enabled" "Always warn about invalid signatures". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for warnaboutinvalid is set to REG_DWORD = 1, this is not a finding.
Fix: F-25018r442291_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning to "Enabled" "Always warn about invalid signatures".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- O365-OU-000013
- Vuln IDs
-
- V-223358
- V-99791
- Rule IDs
-
- SV-223358r508019_rule
- SV-108895
Checks: C-25031r442293_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Status dialog box >> Retrieving CRLs (Certificate Revocation Lists) is set to "Enabled" "When online always retrieve the CRL". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ outlook\security If the value for usecrlchasing is set to REG_DWORD = 1, this is not a finding.
Fix: F-25019r442294_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Status dialog box >> Retrieving CRLs (Certificate Revocation Lists) to "Enabled" "When online always retrieve the CRL".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000014
- Vuln IDs
-
- V-223359
- V-99793
- Rule IDs
-
- SV-223359r508019_rule
- SV-108897
Checks: C-25032r442296_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Outlook Security Mode is set to "Enabled (Use Outlook Security Group Policy)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ outlook\security If the value for adminsecuritymode is set to REG_DWORD = 3, this is not a finding.
Fix: F-25020r442297_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Outlook Security Mode to "Enabled (Use Outlook Security Group Policy)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000015
- Vuln IDs
-
- V-223360
- V-99795
- Rule IDs
-
- SV-223360r508019_rule
- SV-108899
Checks: C-25033r442299_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value allowuserstolowerattachments is set to REG_DWORD = 0, this is not a finding.
Fix: F-25021r442300_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000016
- Vuln IDs
-
- V-223361
- V-99797
- Rule IDs
-
- SV-223361r508019_rule
- SV-108901
Checks: C-25034r442302_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Display Level 1 attachments is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-25022r442303_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security "Display Level 1 attachments" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000017
- Vuln IDs
-
- V-223362
- V-99799
- Rule IDs
-
- SV-223362r508019_rule
- SV-108903
Checks: C-25035r442305_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 1 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security\FileExtensionsRemoveLevel1 If the registry key exists, this is a finding.
Fix: F-25023r442306_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 1 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000018
- Vuln IDs
-
- V-223363
- V-99801
- Rule IDs
-
- SV-223363r508019_rule
- SV-108905
Checks: C-25036r442308_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 2 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook \security\FileExtensionsRemoveLevel2 If the registry key exists, this is a finding.
Fix: F-25024r442309_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 2 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000019
- Vuln IDs
-
- V-223364
- V-99803
- Rule IDs
-
- SV-223364r508019_rule
- SV-108907
Checks: C-25037r442311_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Custom Form Security "Allow scripts in one-off Outlook forms" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix: F-25025r442312_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Custom Form Security "Allow scripts in one-off Outlook forms" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000020
- Vuln IDs
-
- V-223365
- V-99805
- Rule IDs
-
- SV-223365r508019_rule
- SV-108909
Checks: C-25038r442314_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Set Outlook object model custom actions execution prompt is set to "Enabled" and "Automatically Deny". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomcustomaction is set to REG_DWORD = 0, this is not a finding.
Fix: F-25026r442315_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Set Outlook object model custom actions execution prompt to "Enabled" and select "Automatically Deny".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000021
- Vuln IDs
-
- V-223366
- V-99807
- Rule IDs
-
- SV-223366r508019_rule
- SV-108911
Checks: C-25039r442317_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing an address book is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomaddressbookaccess is set to REG_DWORD = 0, this is not a finding.
Fix: F-25027r442318_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing an address book to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000022
- Vuln IDs
-
- V-223367
- V-99809
- Rule IDs
-
- SV-223367r508019_rule
- SV-108913
Checks: C-25040r442320_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing the Formula property of a UserProperty object is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-25028r442321_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt When accessing the Formula property of a UserProperty object to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000023
- Vuln IDs
-
- V-223368
- V-99811
- Rule IDs
-
- SV-223368r508019_rule
- SV-108915
Checks: C-25041r442323_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when executing Save As is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomsaveas is set to REG_DWORD = 0, this is not a finding.
Fix: F-25029r442324_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when executing Save As to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000024
- Vuln IDs
-
- V-223369
- V-99813
- Rule IDs
-
- SV-223369r508019_rule
- SV-108917
Checks: C-25042r442326_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomaddressinformationaccess is set to REG_DWORD = 0, this is not a finding.
Fix: F-25030r442327_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000025
- Vuln IDs
-
- V-223370
- V-99815
- Rule IDs
-
- SV-223370r508019_rule
- SV-108919
Checks: C-25043r442329_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests is set to "Enabled (Automatically Deny)" Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoommeetingtaskrequestresponse is set to REG_DWORD = 0, this is not a finding.
Fix: F-25031r442330_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000026
- Vuln IDs
-
- V-223371
- V-99817
- Rule IDs
-
- SV-223371r508019_rule
- SV-108921
Checks: C-25044r442332_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomsend is set to REG_DWORD = 0, this is not a finding.
Fix: F-25032r442333_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail to "Enabled (Automatically Deny)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000027
- Vuln IDs
-
- V-223372
- V-99819
- Rule IDs
-
- SV-223372r508019_rule
- SV-108923
Checks: C-25045r442335_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-25033r442336_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000028
- Vuln IDs
-
- V-223373
- V-99821
- Rule IDs
-
- SV-223373r508019_rule
- SV-108925
Checks: C-25046r442338_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must be set to "Enabled: Warn for signed, disable unsigned". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for level is set to REG_DWORD = 3, this is not a finding.
Fix: F-25034r442339_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must to "Enabled: Warn for signed, disable unsigned".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PR-000001
- Vuln IDs
-
- V-223374
- V-99851
- Rule IDs
-
- SV-223374r508019_rule
- SV-108955
Checks: C-25047r442341_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ms project\security\trusted locations If the value allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-25035r442342_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PR-000002
- Vuln IDs
-
- V-223375
- V-99853
- Rule IDs
-
- SV-223375r508019_rule
- SV-108957
Checks: C-25048r442344_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\ms project\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25036r442345_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-PR-000003
- Vuln IDs
-
- V-223376
- V-99855
- Rule IDs
-
- SV-223376r508019_rule
- SV-108959
Checks: C-25049r442347_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\project\security If the value for vbawarnings is REG_DWORD = 1, this is not a finding.
Fix: F-25037r442348_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-PT-000001
- Vuln IDs
-
- V-223377
- V-99825
- Rule IDs
-
- SV-223377r508019_rule
- SV-108929
Checks: C-25050r442350_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value for vbawarnings is REG_DWORD = 0, this is not a finding.
Fix: F-25038r442351_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000002
- Vuln IDs
-
- V-223378
- V-99827
- Rule IDs
-
- SV-223378r508019_rule
- SV-108931
Checks: C-25051r442353_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs is set to "Enabled" "Disable (do not run any programs)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value runprograms does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-25039r442354_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs to "Enabled" "Disable (do not run any programs)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000003
- Vuln IDs
-
- V-223379
- V-99829
- Rule IDs
-
- SV-223379r508019_rule
- SV-108933
Checks: C-25052r442356_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files is set to "Enabled" "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security\fileblock If the value for binaryfiles is set to REG_DWORD = 1, this is not a finding.
Fix: F-25040r442357_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files to "Enabled" "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000004
- Vuln IDs
-
- V-223380
- V-99831
- Rule IDs
-
- SV-223380r508019_rule
- SV-108935
Checks: C-25053r442359_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-25041r442360_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000005
- Vuln IDs
-
- V-223381
- V-99833
- Rule IDs
-
- SV-223381r508019_rule
- SV-108937
Checks: C-25054r442362_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" is set to "Enabled" and "Scan encrypted macros". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security If the value PowerPointBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-25042r442363_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" to "Enabled" and "Scan encrypted macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000006
- Vuln IDs
-
- V-223382
- V-99835
- Rule IDs
-
- SV-223382r508019_rule
- SV-108939
Checks: C-25055r442365_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-25043r442366_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000007
- Vuln IDs
-
- V-223383
- V-99837
- Rule IDs
-
- SV-223383r508019_rule
- SV-108941
Checks: C-25056r442368_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\powerpoint\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-25044r442369_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PT-000008
- Vuln IDs
-
- V-223384
- V-99839
- Rule IDs
-
- SV-223384r508019_rule
- SV-108943
Checks: C-25057r442371_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\powerpoint\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25045r442372_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000009
- Vuln IDs
-
- V-223385
- V-99841
- Rule IDs
-
- SV-223385r508019_rule
- SV-108945
Checks: C-25058r442374_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25046r442375_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000010
- Vuln IDs
-
- V-223386
- V-99843
- Rule IDs
-
- SV-223386r508019_rule
- SV-108947
Checks: C-25059r442377_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25047r442378_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000011
- Vuln IDs
-
- V-223387
- V-99845
- Rule IDs
-
- SV-223387r508019_rule
- SV-108949
Checks: C-25060r442380_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25048r442381_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000012
- Vuln IDs
-
- V-223388
- V-99847
- Rule IDs
-
- SV-223388r508019_rule
- SV-108951
Checks: C-25061r442383_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-25049r442384_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000013
- Vuln IDs
-
- V-223389
- V-99849
- Rule IDs
-
- SV-223389r508019_rule
- SV-108953
Checks: C-25062r442386_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-25050r442387_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PU-000001
- Vuln IDs
-
- V-223390
- V-99857
- Rule IDs
-
- SV-223390r508019_rule
- SV-108961
Checks: C-25063r442389_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level is set to "Enabled" "By UI (prompted)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\security If the value automationsecuritypublisher is REG_DWORD = 0, this is not a finding.
Fix: F-25051r442390_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level to "Enabled" "By UI (prompted)"
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PU-000002
- Vuln IDs
-
- V-223391
- V-99859
- Rule IDs
-
- SV-223391r508019_rule
- SV-108963
Checks: C-25064r442392_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25052r442393_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PU-000003
- Vuln IDs
-
- V-223392
- V-99861
- Rule IDs
-
- SV-223392r508019_rule
- SV-108965
Checks: C-25065r442395_chk
Set policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros" Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value vbawarnings is REG_DWORD = 1, this is not a finding.
Fix: F-25053r442396_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016\Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings must to Disable all except digitally signed macros.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-VI-000001
- Vuln IDs
-
- V-223393
- V-99863
- Rule IDs
-
- SV-223393r508019_rule
- SV-108967
Checks: C-25066r442398_chk
Verify the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" and "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value for vbawarnings is REG_DWORD = 3, this is not a finding.
Fix: F-25054r442399_fix
Set the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" and select "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-VI-000002
- Vuln IDs
-
- V-223394
- V-99865
- Rule IDs
-
- SV-223394r508019_rule
- SV-108969
Checks: C-25067r442401_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-25055r442402_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-VI-000003
- Vuln IDs
-
- V-223395
- V-99867
- Rule IDs
-
- SV-223395r508019_rule
- SV-108971
Checks: C-25068r442404_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to Enabled. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25056r442405_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to Enabled.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000004
- Vuln IDs
-
- V-223396
- V-99869
- Rule IDs
-
- SV-223396r508019_rule
- SV-108973
Checks: C-25069r442407_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2000files" is REG_DWORD = 2, this is not a finding.
Fix: F-25057r442408_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000005
- Vuln IDs
-
- V-223397
- V-99871
- Rule IDs
-
- SV-223397r508019_rule
- SV-108975
Checks: C-25070r442410_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2003files" is REG_DWORD = 2, this is not a finding.
Fix: F-25058r442411_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000006
- Vuln IDs
-
- V-223398
- V-99873
- Rule IDs
-
- SV-223398r508019_rule
- SV-108977
Checks: C-25071r442413_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio50andearlierfiles" is REG_DWORD = 2, this is not a finding.
Fix: F-25059r442414_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-VI-000007
- Vuln IDs
-
- V-223399
- V-99875
- Rule IDs
-
- SV-223399r508019_rule
- SV-108979
Checks: C-25072r442416_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-25060r442417_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-WD-000001
- Vuln IDs
-
- V-223400
- V-99877
- Rule IDs
-
- SV-223400r508019_rule
- SV-108981
Checks: C-25073r442419_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value for notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25061r442420_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000002
- Vuln IDs
-
- V-223401
- V-99879
- Rule IDs
-
- SV-223401r508019_rule
- SV-108983
Checks: C-25074r442422_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents is set to "Enabled" "Scan encrypted macros (default)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value WordBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-25062r442423_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents to "Enabled" "Scan encrypted macros (default)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000003
- Vuln IDs
-
- V-223402
- V-99881
- Rule IDs
-
- SV-223402r508019_rule
- SV-108985
Checks: C-25075r442425_chk
Verify the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableinternetfilesinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25063r442426_fix
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000004
- Vuln IDs
-
- V-223403
- V-99883
- Rule IDs
-
- SV-223403r508019_rule
- SV-108987
Checks: C-25076r442428_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview. If the value for disableunsafelocationsinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25064r442429_fix
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000005
- Vuln IDs
-
- V-223404
- V-99885
- Rule IDs
-
- SV-223404r508019_rule
- SV-108989
Checks: C-25077r442431_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Word\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-25065r442432_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000006
- Vuln IDs
-
- V-223405
- V-99887
- Rule IDs
-
- SV-223405r508019_rule
- SV-108991
Checks: C-25078r442434_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableattachmentsinpv is REG_DWORD = 0, this is not a finding.
Fix: F-25066r442435_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000007
- Vuln IDs
-
- V-223406
- V-99889
- Rule IDs
-
- SV-223406r508019_rule
- SV-108993
Checks: C-25079r442437_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-25067r442438_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000008
- Vuln IDs
-
- V-223407
- V-99891
- Rule IDs
-
- SV-223407r508019_rule
- SV-108995
Checks: C-25080r442440_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix: F-25068r442441_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000009
- Vuln IDs
-
- V-223408
- V-99893
- Rule IDs
-
- SV-223408r508019_rule
- SV-108997
Checks: C-25081r442443_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2000Files is REG_DWORD = 2, this is not a finding.
Fix: F-25069r442444_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000010
- Vuln IDs
-
- V-223409
- V-99895
- Rule IDs
-
- SV-223409r508019_rule
- SV-108999
Checks: C-25082r442446_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2003files is REG_DWORD = 2, this is not a finding.
Fix: F-25070r442447_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000011
- Vuln IDs
-
- V-223410
- V-99897
- Rule IDs
-
- SV-223410r508019_rule
- SV-109001
Checks: C-25083r442449_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2007files is REG_DWORD = 2, this is not a finding.
Fix: F-25071r442450_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000012
- Vuln IDs
-
- V-223411
- V-99899
- Rule IDs
-
- SV-223411r508019_rule
- SV-109003
Checks: C-25084r442452_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word60files is REG_DWORD = 2, this is not a finding.
Fix: F-25072r442453_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000013
- Vuln IDs
-
- V-223412
- V-99901
- Rule IDs
-
- SV-223412r508019_rule
- SV-109005
Checks: C-25085r442455_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word95files is REG_DWORD = 2, this is not a finding.
Fix: F-25073r442456_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000014
- Vuln IDs
-
- V-223413
- V-99903
- Rule IDs
-
- SV-223413r508019_rule
- SV-109007
Checks: C-25086r442458_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word97files is REG_DWORD = 2, this is not a finding.
Fix: F-25074r442459_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000015
- Vuln IDs
-
- V-223414
- V-99905
- Rule IDs
-
- SV-223414r508019_rule
- SV-109009
Checks: C-25087r442461_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value wordxpfiles is REG_DWORD = 2, this is not a finding.
Fix: F-25075r442462_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000016
- Vuln IDs
-
- V-223415
- V-99907
- Rule IDs
-
- SV-223415r508019_rule
- SV-109011
Checks: C-25088r442464_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-25076r442465_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000017
- Vuln IDs
-
- V-223416
- V-99909
- Rule IDs
-
- SV-223416r508019_rule
- SV-109013
Checks: C-25089r442467_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-25077r442468_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-WD-000018
- Vuln IDs
-
- V-223417
- V-99911
- Rule IDs
-
- SV-223417r508019_rule
- SV-109015
Checks: C-25090r442470_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" is set to "Enabled" and "Disable all except digitally signed macros" from the Options. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\word\security If the value vbawarnings is REG_DWORD = 3, this is not a finding.
Fix: F-25078r442471_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" to "Enabled" and "Disable all except digitally signed macros" from the Options.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-WD-000019
- Vuln IDs
-
- V-223418
- V-100517
- Rule IDs
-
- SV-223418r508019_rule
- SV-109621
Checks: C-25091r442473_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\filevalidation If the value for enableonload is REG_DWORD = 1, this is not a finding.
Fix: F-25079r442474_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation to "Disabled".