Microsoft Office 365 ProPlus Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 8
Comparison against the immediately-prior release (V2R4). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 8
- V-223290 Medium descriptioncheck Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.
- V-223295 Medium descriptionfix The load of controls in Forms3 must be blocked.
- V-223297 Medium check Consistent MIME handling must be enabled for all Office 365 ProPlus programs.
- V-223332 Medium descriptionfix File extensions must be enabled to match file types in Excel.
- V-223339 Medium check Untrusted database files must be opened in Excel in Protected View mode.
- V-223351 Medium fix Junk email level must be enabled at a setting of High.
- V-223354 Medium check Internet must not be included in Safe Zone for picture download in Outlook.
- V-223392 Medium fix Publisher must disable all unsigned VBA macros.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-AC-000001
- Vuln IDs
-
- V-223280
- V-99633
- Rule IDs
-
- SV-223280r508019_rule
- SV-108737
Checks: C-24953r442059_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-24941r442060_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-AC-000002
- Vuln IDs
-
- V-223281
- V-99635
- Rule IDs
-
- SV-223281r508019_rule
- SV-108739
Checks: C-24954r442062_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-24942r442063_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-AC-000003
- Vuln IDs
-
- V-223282
- V-99637
- Rule IDs
-
- SV-223282r811471_rule
- SV-108741
Checks: C-24955r811470_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. Values of REG_DWORD = 2 or 4 are also acceptable. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-24943r442066_fix
Set User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-AC-000004
- Vuln IDs
-
- V-223283
- V-99639
- Rule IDs
-
- SV-223283r508019_rule
- SV-108743
Checks: C-24956r442068_chk
Verify the policy for Set the User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> Trusted Locations >> Allow trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\access\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-24944r442069_fix
Set the User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> Trusted Locations >> Allow trusted Locations on the network to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000001
- Vuln IDs
-
- V-223284
- V-99641
- Rule IDs
-
- SV-223284r508192_rule
- SV-108745
Checks: C-24957r572109_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 2, this is not a finding.
Fix: F-24945r442072_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- O365-CO-000002
- Vuln IDs
-
- V-223285
- V-99643
- Rule IDs
-
- SV-223285r508019_rule
- SV-108747
Checks: C-24958r442074_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-24946r442075_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-CO-000003
- Vuln IDs
-
- V-223286
- V-99645
- Rule IDs
-
- SV-223286r538226_rule
- SV-108749
Checks: C-24959r572107_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding.
Fix: F-24947r572108_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000004
- Vuln IDs
-
- V-223287
- V-99647
- Rule IDs
-
- SV-223287r508019_rule
- SV-108751
Checks: C-24960r442080_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding.
Fix: F-24948r442081_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000005
- Vuln IDs
-
- V-223288
- V-99649
- Rule IDs
-
- SV-223288r811473_rule
- SV-108753
Checks: C-24961r811472_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls is set to REG_DWORD=6, this is not a finding.
Fix: F-24949r442084_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000006
- Vuln IDs
-
- V-223289
- V-99651
- Rule IDs
-
- SV-223289r508019_rule
- SV-108755
Checks: C-24962r442086_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix: F-24950r442087_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-CO-000007
- Vuln IDs
-
- V-223290
- V-99653
- Rule IDs
-
- SV-223290r822358_rule
- SV-108757
Checks: C-24963r822357_chk
Verify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value trustbar is REG_DWORD = 0, this is not a finding.
Fix: F-24951r442090_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- O365-CO-000008
- Vuln IDs
-
- V-223291
- V-99655
- Rule IDs
-
- SV-223291r508019_rule
- SV-108759
Checks: C-24964r442092_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-24952r442093_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- O365-CO-000009
- Vuln IDs
-
- V-223292
- V-99657
- Rule IDs
-
- SV-223292r508019_rule
- SV-108761
Checks: C-24965r442095_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-24953r442096_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- O365-CO-000010
- Vuln IDs
-
- V-223293
- V-99659
- Rule IDs
-
- SV-223293r508019_rule
- SV-108763
Checks: C-24966r442098_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016\Security Settings\Trust Center >> Allow mix of policy and user locations is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security\trusted locations If the value for allow user locations is set to REG_DWORD = 0, this is not a finding.
Fix: F-24954r442099_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Trust Center >> Allow mix of policy and user locations to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000012
- Vuln IDs
-
- V-223294
- V-99663
- Rule IDs
-
- SV-223294r508019_rule
- SV-108767
Checks: C-24967r442101_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\smart tag If the value for neverloadmanifests is REG_DWORD = 1, this is not a finding.
Fix: F-24955r442102_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000013
- Vuln IDs
-
- V-223295
- V-99665
- Rule IDs
-
- SV-223295r822360_rule
- SV-108769
Checks: C-24968r811476_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" is set to Enabled and 1 from drop down. (For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration.)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\VBA\Security If the value LoadControlsInForms is REG_DWORD=1, this is not a finding. If the value LoadControlsInForms does not exist, this is not a finding.
Fix: F-24956r822359_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" to "Enabled:1" or set it to "Disabled."
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000014
- Vuln IDs
-
- V-223296
- V-99667
- Rule IDs
-
- SV-223296r508019_rule
- SV-108771
Checks: C-24969r442107_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Add-on Management" is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT If the value for each installed Office Program is REG_DWORD = 1, this is not a finding.
Fix: F-24957r442108_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Add-on Management" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000015
- Vuln IDs
-
- V-223297
- V-99669
- Rule IDs
-
- SV-223297r822362_rule
- SV-108773
Checks: C-24970r822361_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Consistent Mime Handling is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_handling If the value for all installed Office programs is set to is REG_DWORD=1, this is not a finding.
Fix: F-24958r442111_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Consistent Mime Handling" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000016
- Vuln IDs
-
- V-223298
- V-99671
- Rule IDs
-
- SV-223298r508019_rule
- SV-108775
Checks: C-24971r442113_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24959r442114_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000017
- Vuln IDs
-
- V-223299
- V-99673
- Rule IDs
-
- SV-223299r508019_rule
- SV-108777
Checks: C-24972r442116_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_securityband If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24960r442117_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000018
- Vuln IDs
-
- V-223300
- V-99675
- Rule IDs
-
- SV-223300r508019_rule
- SV-108779
Checks: C-24973r442119_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown Security is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_localmachine_lockdown If the value for all installed Office programs is REG_DWORD = 1, this is not a finding.
Fix: F-24961r442120_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000019
- Vuln IDs
-
- V-223301
- V-99677
- Rule IDs
-
- SV-223301r508019_rule
- SV-108781
Checks: C-24974r442122_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_sniffing If the value for all installed Office Programs is REG_DWORD = 1, this is not a finding.
Fix: F-24962r442123_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature to "Enabled" for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000020
- Vuln IDs
-
- V-223302
- V-99679
- Rule IDs
-
- SV-223302r508019_rule
- SV-108783
Checks: C-24975r442125_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Navigate URL is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_validate_navigate_url If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24963r442126_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Navigate URL to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000021
- Vuln IDs
-
- V-223303
- V-99681
- Rule IDs
-
- SV-223303r508019_rule
- SV-108785
Checks: C-24976r442128_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_object_caching If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24964r442129_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000022
- Vuln IDs
-
- V-223304
- V-99683
- Rule IDs
-
- SV-223304r508019_rule
- SV-108787
Checks: C-24977r442131_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Protection from Zone Elevation is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_zone_elevation If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24965r442132_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Protection from Zone Elevation to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000023
- Vuln IDs
-
- V-223305
- V-99685
- Rule IDs
-
- SV-223305r508019_rule
- SV-108789
Checks: C-24978r442134_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict ActiveX Install is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_restrict_activexinstall If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24966r442135_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict ActiveX Install to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000024
- Vuln IDs
-
- V-223306
- V-99687
- Rule IDs
-
- SV-223306r508019_rule
- SV-108791
Checks: C-24979r442137_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict File Download is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_restrict_filedownload If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24967r442138_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict File Download to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000025
- Vuln IDs
-
- V-223307
- V-99689
- Rule IDs
-
- SV-223307r744249_rule
- SV-108793
Checks: C-24980r744248_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Saved from URL is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_unc_savedfilecheck If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24968r442141_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Saved from URL to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000026
- Vuln IDs
-
- V-223308
- V-99691
- Rule IDs
-
- SV-223308r508019_rule
- SV-108795
Checks: C-24981r442143_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Scripted Window Security Restrictions is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-24969r442144_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >>Scripted Window Security Restrictions to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000027
- Vuln IDs
-
- V-223309
- V-99693
- Rule IDs
-
- SV-223309r811479_rule
- SV-108797
Checks: C-24982r811478_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation is set to "Enabled" Block all activation. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Microsoft\Office\Common\COM Compatibility If the value for COMMENT is REG_SZ = Block all Flash activation, this is not a finding.
Fix: F-24970r442147_fix
Set the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation to "Enabled" (Block all activation).
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000001
- Vuln IDs
-
- V-223310
- V-99695
- Rule IDs
-
- SV-223310r508019_rule
- SV-108799
Checks: C-24983r442149_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\trusted locations If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-24971r442150_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-EX-000002
- Vuln IDs
-
- V-223311
- V-99697
- Rule IDs
-
- SV-223311r811481_rule
- SV-108801
Checks: C-24984r811480_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Application Settings >> Security >> Trust Center >> "VBA macro Notification Settings" is set to "Enabled" and "Disable all except digitally signed macros" from the Options. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\excel\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. Values of REG_DWORD = 2 or 4 are also acceptable. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-24972r442153_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Application Settings >> Security >> Trust Center >> "VBA macro Notification Settings" to "Enabled" and "Disable all except digitally signed macros" from the Options.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000003
- Vuln IDs
-
- V-223312
- V-99699
- Rule IDs
-
- SV-223312r508019_rule
- SV-108803
Checks: C-24985r442155_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlaunch" is REG_DWORD = 1, this is not a finding.
Fix: F-24973r442156_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000004
- Vuln IDs
-
- V-223313
- V-99701
- Rule IDs
-
- SV-223313r508019_rule
- SV-108805
Checks: C-24986r442158_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlookup" is REG_DWORD = 1, this is not a finding.
Fix: F-24974r442159_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000005
- Vuln IDs
-
- V-223314
- V-99703
- Rule IDs
-
- SV-223314r508019_rule
- SV-108807
Checks: C-24987r442161_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "dBase III / IV files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value DBaseFiles is REG_DWORD = 2, this is not a finding.
Fix: F-24975r442162_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "dBase III / IV files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000006
- Vuln IDs
-
- V-223315
- V-99705
- Rule IDs
-
- SV-223315r508019_rule
- SV-108809
Checks: C-24988r442164_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Dif and Sylk files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value DifandSylkFiles is REG_DWORD = 2, this is not a finding.
Fix: F-24976r442165_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Dif and Sylk files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000007
- Vuln IDs
-
- V-223316
- V-99707
- Rule IDs
-
- SV-223316r508019_rule
- SV-108811
Checks: C-24989r442167_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL2Macros is REG_DWORD = 2, this is not a finding.
Fix: F-24977r442168_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000008
- Vuln IDs
-
- V-223317
- V-99709
- Rule IDs
-
- SV-223317r508019_rule
- SV-108813
Checks: C-24990r442170_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL2Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-24978r442171_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000009
- Vuln IDs
-
- V-223318
- V-99711
- Rule IDs
-
- SV-223318r508019_rule
- SV-108815
Checks: C-24991r442173_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL3Macros is REG_DWORD = 2, this is not a finding.
Fix: F-24979r442174_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000010
- Vuln IDs
-
- V-223319
- V-99713
- Rule IDs
-
- SV-223319r508019_rule
- SV-108817
Checks: C-24992r442176_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL3Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-24980r442177_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000011
- Vuln IDs
-
- V-223320
- V-99715
- Rule IDs
-
- SV-223320r508019_rule
- SV-108819
Checks: C-24993r442179_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Macros is REG_DWORD = 2, this is not a finding.
Fix: F-24981r442180_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000012
- Vuln IDs
-
- V-223321
- V-99717
- Rule IDs
-
- SV-223321r508019_rule
- SV-108821
Checks: C-24994r442182_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 workbooks" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Workbooks is REG_DWORD = 2, this is not a finding.
Fix: F-24982r442183_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 workbooks" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000013
- Vuln IDs
-
- V-223322
- V-99719
- Rule IDs
-
- SV-223322r508019_rule
- SV-108823
Checks: C-24995r442185_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-24983r442186_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000014
- Vuln IDs
-
- V-223323
- V-99721
- Rule IDs
-
- SV-223323r508019_rule
- SV-108825
Checks: C-24996r442188_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\fileblock If the value for xl9597workbooksandtemplates is REG_DWORD = 2, this is not a finding.
Fix: F-24984r442189_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000015
- Vuln IDs
-
- V-223324
- V-99723
- Rule IDs
-
- SV-223324r508019_rule
- SV-108827
Checks: C-24997r442191_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\office\16.0\excel\security\fileblock If the value XL9597WorkbooksandTemplates is REG_DWORD = 2, this is not a finding.
Fix: F-24985r442192_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000016
- Vuln IDs
-
- V-223325
- V-99725
- Rule IDs
-
- SV-223325r508019_rule
- SV-108829
Checks: C-24998r442194_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Set default file block behavior is set to "Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-24986r442195_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Set default file block behavior to "Enabled:Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000017
- Vuln IDs
-
- V-223326
- V-99727
- Rule IDs
-
- SV-223326r508019_rule
- SV-108831
Checks: C-24999r442197_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Web pages and Excel 2003 XML spreadsheets is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\fileblock If the value for htmlandxmlssfiles is REG_DWORD = 2, this is not a finding.
Fix: F-24987r442198_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Web pages and Excel 2003 XML spreadsheets to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000018
- Vuln IDs
-
- V-223327
- V-99729
- Rule IDs
-
- SV-223327r508019_rule
- SV-108833
Checks: C-25000r442200_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Data Recovery >> Do not show data extraction options when opening corrupt workbooks is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If the value for extractdatadisableui is REG_DWORD = 1, this is not a finding.
Fix: F-24988r442201_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Data Recovery >> Do not show data extraction options when opening corrupt workbooks to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000019
- Vuln IDs
-
- V-223328
- V-99731
- Rule IDs
-
- SV-223328r744251_rule
- SV-108835
Checks: C-25001r744250_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options\binaryoptions If the value for fupdateext_78_1 is REG_DWORD = 0, this is not a finding.
Fix: F-24989r442204_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-EX-000020
- Vuln IDs
-
- V-223329
- V-99733
- Rule IDs
-
- SV-223329r508019_rule
- SV-108837
Checks: C-25002r442206_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General. Load pictures from Web pages not created in Excel is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\internet If the value for donotloadpictures is REG_DWORD = 1, this is not a finding.
Fix: F-24990r442207_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General >> Load pictures from Web pages not created in Excel to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000021
- Vuln IDs
-
- V-223330
- V-99735
- Rule IDs
-
- SV-223330r508019_rule
- SV-108839
Checks: C-25003r442209_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish is to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If the value for disableautorepublish is REG_DWORD = 1, this is not a finding.
Fix: F-24991r442210_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000022
- Vuln IDs
-
- V-223331
- V-99737
- Rule IDs
-
- SV-223331r744253_rule
- SV-108841
Checks: C-25004r744252_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If value for disableautorepublishwarning is REG_DWORD = 0, this is not a finding.
Fix: F-24992r442213_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000023
- Vuln IDs
-
- V-223332
- V-99739
- Rule IDs
-
- SV-223332r822365_rule
- SV-108843
Checks: C-25005r822363_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type is set to "Always match file type". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If value for extensionhardening is REG_DWORD = 2, this is not a finding.
Fix: F-24993r822364_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type to "Enabled" and select the option "Always match file type".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000024
- Vuln IDs
-
- V-223333
- V-99741
- Rule IDs
-
- SV-223333r508019_rule
- SV-108845
Checks: C-25006r442218_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Scan encrypted macros in Excel Open XML workbooks is set to "Scan encrypted macros (default)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value excelbypassencryptiedmacrosscan does not exist, this is not a finding. If the value for excelbypassencryptedmacroscan is REG_DWORD = 0, this is not a finding.
Fix: F-24994r442219_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Scan encrypted macros in Excel Open XML workbooks to "Scan encrypted macros (default)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-EX-000025
- Vuln IDs
-
- V-223334
- V-99743
- Rule IDs
-
- SV-223334r508019_rule
- SV-108847
Checks: C-25007r442221_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Turn off file validation is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\filevalidation If the value for enableonload is REG_DWORD = 1, this is not a finding.
Fix: F-24995r442222_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Turn off file validation to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000026
- Vuln IDs
-
- V-223335
- V-99745
- Rule IDs
-
- SV-223335r508019_rule
- SV-108849
Checks: C-25008r442224_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> WEBSERVICE Function Notification Settings is set to "Enabled" and "Disable all with notification". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value webservicefunctionwarnings does not exist, this is not a finding. If the value for webservicefunctionwarnings is REG_DWORD = 1, this is not a finding. If the value for webservicefunctionwarnings is REG_DWORD = 2, this is a finding.
Fix: F-24996r442225_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> WEBSERVICE Function Notification Settings to "Enabled" and "Disable all with notification".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000027
- Vuln IDs
-
- V-223336
- V-99747
- Rule IDs
-
- SV-223336r508019_rule
- SV-108851
Checks: C-25009r442227_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-24997r442228_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-EX-000028
- Vuln IDs
-
- V-223337
- V-99749
- Rule IDs
-
- SV-223337r508019_rule
- SV-108853
Checks: C-25010r442230_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value for notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-24998r442231_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000029
- Vuln IDs
-
- V-223338
- V-99751
- Rule IDs
-
- SV-223338r684249_rule
- SV-108855
Checks: C-25011r684248_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\external content. Value for enableblockunsecurequeryfiles should be REG_DWORD = 1 If the value for enableblockunsecurequeryfiles is Reg_DWORD = 1, this is not a finding.
Fix: F-24999r442234_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000030
- Vuln IDs
-
- V-223339
- V-99753
- Rule IDs
-
- SV-223339r840162_rule
- SV-108857
Checks: C-25012r840161_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Always open untrusted database files in Protected View is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value for enabledatabasefileprotectedview is REG_DWORD = 1, this is not a finding.
Fix: F-25000r572105_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Always open untrusted database files in Protected View to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000031
- Vuln IDs
-
- V-223340
- V-99755
- Rule IDs
-
- SV-223340r508019_rule
- SV-108859
Checks: C-25013r442239_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25001r442240_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000032
- Vuln IDs
-
- V-223341
- V-99757
- Rule IDs
-
- SV-223341r508019_rule
- SV-108861
Checks: C-25014r442242_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25002r442243_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000033
- Vuln IDs
-
- V-223342
- V-99759
- Rule IDs
-
- SV-223342r508019_rule
- SV-108863
Checks: C-25015r442245_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Excel\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-25003r442246_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000034
- Vuln IDs
-
- V-223343
- V-99761
- Rule IDs
-
- SV-223343r508019_rule
- SV-108865
Checks: C-25016r442248_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Turn off Protected View for attachments opened from Outlook is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25004r442249_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Turn off Protected View for attachments opened from Outlook to "Disabled".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- O365-LY-000001
- Vuln IDs
-
- V-223344
- V-99763
- Rule IDs
-
- SV-223344r508019_rule
- SV-108867
Checks: C-25017r442251_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Configure SIP security mode" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\16.0\lync If the value enablesiphighsecuritymode is REG_DWORD = 1, this is not a finding.
Fix: F-25005r442252_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Configure SIP security mode" to "Enabled".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- O365-LY-000002
- Vuln IDs
-
- V-223345
- V-99765
- Rule IDs
-
- SV-223345r508019_rule
- SV-108869
Checks: C-25018r442254_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Disable HTTP fallback for SIP connection" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\16.0\lync If the value disablehttpconnect is REG_DWORD = 1, this is not a finding.
Fix: F-25006r442255_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Disable HTTP fallback for SIP connection" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- O365-OU-000001
- Vuln IDs
-
- V-223346
- V-99767
- Rule IDs
-
- SV-223346r811485_rule
- SV-108871
Checks: C-25019r811484_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Authentication with Exchange Server is set to Kerberos Password Authentication. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value authenticationservice is set to REG_DWORD = 16 (decimal) or 10 (hex), this is not a finding.
Fix: F-25007r442258_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Authentication with Exchange Server to Kerberos Password Authentication.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- O365-OU-000002
- Vuln IDs
-
- V-223347
- V-99769
- Rule IDs
-
- SV-223347r508019_rule
- SV-108873
Checks: C-25020r442260_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Enable RPC encryption is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\rpc If the value for enablerpcencryption is set to REG_DWORD = 1, this is not a finding.
Fix: F-25008r442261_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Enable RPC encryption to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000003
- Vuln IDs
-
- V-223348
- V-99771
- Rule IDs
-
- SV-223348r744257_rule
- SV-108875
Checks: C-25021r744256_chk
Verify the policy for Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for public folders is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for publicfolderscript is set to REG_DWORD = 0, this is not a finding.
Fix: F-25009r442264_fix
Set the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for public folders to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000004
- Vuln IDs
-
- V-223349
- V-99773
- Rule IDs
-
- SV-223349r744259_rule
- SV-108877
Checks: C-25022r744258_chk
Verify the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for shared folders is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for sharedfolderscript is set to REG_DWORD = 0, this is not a finding.
Fix: F-25010r442267_fix
Set the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for shared folders to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000005
- Vuln IDs
-
- V-223350
- V-99775
- Rule IDs
-
- SV-223350r508019_rule
- SV-108879
Checks: C-25023r442269_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system is set to "Disabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\general If the value for msgformat is set to REG_DWORD = 0, this is not a finding.
Fix: F-25011r442270_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000006
- Vuln IDs
-
- V-223351
- V-99777
- Rule IDs
-
- SV-223351r822370_rule
- SV-108881
Checks: C-25024r822368_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Preferences >> Junk E-mail >> Junk E-mail protection level is set to "High". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\mail If the value junkmailprotection is set to "3", this is not a finding.
Fix: F-25012r822369_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Preferences >> Junk E-mail >> Junk E-mail protection level to "Enabled" and set it to "High".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000007
- Vuln IDs
-
- V-223352
- V-99779
- Rule IDs
-
- SV-223352r508019_rule
- SV-108883
Checks: C-25025r442275_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Allow Active X One Off Forms is set to "Enabled" "Load only Outlook Controls". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for allowactivexoneoffforms is REG_DWORD = 0, this is not a finding.
Fix: F-25013r442276_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Allow Active X One Off Forms to "Enabled" "Load only Outlook Controls".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- O365-OU-000008
- Vuln IDs
-
- V-223353
- V-99781
- Rule IDs
-
- SV-223353r508019_rule
- SV-108885
Checks: C-25026r442278_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Prevent users from customizing attachment security settings is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook If the value for disallowattachmentcustomization is set to REG_DWORD = 1, this is not a finding.
Fix: F-25014r442279_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Prevent users from customizing attachment security settings to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000009
- Vuln IDs
-
- V-223354
- V-99783
- Rule IDs
-
- SV-223354r836316_rule
- SV-108887
Checks: C-25027r836315_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Automatic Picture Download Settings >> Include Internet in Safe Zones for Automatic Picture Download is set to "Disabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\mail If the value for Internet is set to REG_DWORD = 0, this is not a finding.
Fix: F-25015r442282_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Automatic Picture Download Settings >> Include Internet in Safe Zones for Automatic Picture Download to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000010
- Vuln IDs
-
- V-223355
- V-99785
- Rule IDs
-
- SV-223355r811489_rule
- SV-108889
Checks: C-25028r811488_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for publishtogaldisabled is REG_DWORD = 1, this is not a finding.
Fix: F-25016r442285_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button to "Enabled".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- O365-OU-000011
- Vuln IDs
-
- V-223356
- V-99787
- Rule IDs
-
- SV-223356r508019_rule
- SV-108891
Checks: C-25029r442287_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Minimum encryption settings is set to "Enabled" and a Minimum key size (in bits) of "168" or above. Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for minenckey is set to 168 or above, this is not a finding.
Fix: F-25017r442288_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Minimum encryption settings to "Enabled"and a Minimum key size (in bits) of "168" or above.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000012
- Vuln IDs
-
- V-223357
- V-99789
- Rule IDs
-
- SV-223357r508019_rule
- SV-108893
Checks: C-25030r442290_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning is set to "Enabled" "Always warn about invalid signatures". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for warnaboutinvalid is set to REG_DWORD = 1, this is not a finding.
Fix: F-25018r442291_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning to "Enabled" "Always warn about invalid signatures".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- O365-OU-000013
- Vuln IDs
-
- V-223358
- V-99791
- Rule IDs
-
- SV-223358r811491_rule
- SV-108895
Checks: C-25031r811490_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Status dialog box >> Retrieving CRLs (Certificate Revocation Lists) is set to "Enabled" "When online always retrieve the CRL". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for usecrlchasing is set to REG_DWORD = 1, this is not a finding.
Fix: F-25019r442294_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Status dialog box >> Retrieving CRLs (Certificate Revocation Lists) to "Enabled" "When online always retrieve the CRL".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000014
- Vuln IDs
-
- V-223359
- V-99793
- Rule IDs
-
- SV-223359r811493_rule
- SV-108897
Checks: C-25032r811492_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Outlook Security Mode is set to "Enabled (Use Outlook Security Group Policy)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for adminsecuritymode is set to REG_DWORD = 3, this is not a finding.
Fix: F-25020r442297_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Outlook Security Mode to "Enabled (Use Outlook Security Group Policy)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000015
- Vuln IDs
-
- V-223360
- V-99795
- Rule IDs
-
- SV-223360r508019_rule
- SV-108899
Checks: C-25033r442299_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value allowuserstolowerattachments is set to REG_DWORD = 0, this is not a finding.
Fix: F-25021r442300_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000016
- Vuln IDs
-
- V-223361
- V-99797
- Rule IDs
-
- SV-223361r508019_rule
- SV-108901
Checks: C-25034r442302_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Display Level 1 attachments is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-25022r442303_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security "Display Level 1 attachments" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000017
- Vuln IDs
-
- V-223362
- V-99799
- Rule IDs
-
- SV-223362r508019_rule
- SV-108903
Checks: C-25035r442305_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 1 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security\FileExtensionsRemoveLevel1 If the registry key exists, this is a finding.
Fix: F-25023r442306_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 1 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000018
- Vuln IDs
-
- V-223363
- V-99801
- Rule IDs
-
- SV-223363r811495_rule
- SV-108905
Checks: C-25036r811494_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 2 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security\FileExtensionsRemoveLevel2 If the registry key exists, this is a finding.
Fix: F-25024r442309_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 2 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000019
- Vuln IDs
-
- V-223364
- V-99803
- Rule IDs
-
- SV-223364r508019_rule
- SV-108907
Checks: C-25037r442311_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Custom Form Security "Allow scripts in one-off Outlook forms" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix: F-25025r442312_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Custom Form Security "Allow scripts in one-off Outlook forms" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000020
- Vuln IDs
-
- V-223365
- V-99805
- Rule IDs
-
- SV-223365r508019_rule
- SV-108909
Checks: C-25038r442314_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Set Outlook object model custom actions execution prompt is set to "Enabled" and "Automatically Deny". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomcustomaction is set to REG_DWORD = 0, this is not a finding.
Fix: F-25026r442315_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Set Outlook object model custom actions execution prompt to "Enabled" and select "Automatically Deny".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000021
- Vuln IDs
-
- V-223366
- V-99807
- Rule IDs
-
- SV-223366r508019_rule
- SV-108911
Checks: C-25039r442317_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing an address book is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomaddressbookaccess is set to REG_DWORD = 0, this is not a finding.
Fix: F-25027r442318_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing an address book to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000022
- Vuln IDs
-
- V-223367
- V-99809
- Rule IDs
-
- SV-223367r508019_rule
- SV-108913
Checks: C-25040r442320_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing the Formula property of a UserProperty object is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-25028r442321_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt When accessing the Formula property of a UserProperty object to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000023
- Vuln IDs
-
- V-223368
- V-99811
- Rule IDs
-
- SV-223368r508019_rule
- SV-108915
Checks: C-25041r442323_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when executing Save As is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomsaveas is set to REG_DWORD = 0, this is not a finding.
Fix: F-25029r442324_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when executing Save As to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000024
- Vuln IDs
-
- V-223369
- V-99813
- Rule IDs
-
- SV-223369r508019_rule
- SV-108917
Checks: C-25042r442326_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomaddressinformationaccess is set to REG_DWORD = 0, this is not a finding.
Fix: F-25030r442327_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000025
- Vuln IDs
-
- V-223370
- V-99815
- Rule IDs
-
- SV-223370r508019_rule
- SV-108919
Checks: C-25043r442329_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests is set to "Enabled (Automatically Deny)" Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoommeetingtaskrequestresponse is set to REG_DWORD = 0, this is not a finding.
Fix: F-25031r442330_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000026
- Vuln IDs
-
- V-223371
- V-99817
- Rule IDs
-
- SV-223371r508019_rule
- SV-108921
Checks: C-25044r442332_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomsend is set to REG_DWORD = 0, this is not a finding.
Fix: F-25032r442333_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail to "Enabled (Automatically Deny)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000027
- Vuln IDs
-
- V-223372
- V-99819
- Rule IDs
-
- SV-223372r508019_rule
- SV-108923
Checks: C-25045r442335_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-25033r442336_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000028
- Vuln IDs
-
- V-223373
- V-99821
- Rule IDs
-
- SV-223373r508019_rule
- SV-108925
Checks: C-25046r442338_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must be set to "Enabled: Warn for signed, disable unsigned". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for level is set to REG_DWORD = 3, this is not a finding.
Fix: F-25034r442339_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must to "Enabled: Warn for signed, disable unsigned".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PR-000001
- Vuln IDs
-
- V-223374
- V-99851
- Rule IDs
-
- SV-223374r508019_rule
- SV-108955
Checks: C-25047r442341_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ms project\security\trusted locations If the value allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-25035r442342_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PR-000002
- Vuln IDs
-
- V-223375
- V-99853
- Rule IDs
-
- SV-223375r508019_rule
- SV-108957
Checks: C-25048r442344_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\ms project\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25036r442345_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-PR-000003
- Vuln IDs
-
- V-223376
- V-99855
- Rule IDs
-
- SV-223376r811498_rule
- SV-108959
Checks: C-25049r811496_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ms project\security If the value for vbawarnings is REG_DWORD = 3, this is not a finding. Values of REG_DWORD = 2 or 4 are also acceptable. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-25037r811497_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-PT-000001
- Vuln IDs
-
- V-223377
- V-99825
- Rule IDs
-
- SV-223377r811500_rule
- SV-108929
Checks: C-25050r811499_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value for vbawarnings is REG_DWORD = 3 this is not a finding. Values of REG_DWORD = 2 or 4 are also acceptable. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-25038r442351_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000002
- Vuln IDs
-
- V-223378
- V-99827
- Rule IDs
-
- SV-223378r508019_rule
- SV-108931
Checks: C-25051r442353_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs is set to "Enabled" "Disable (do not run any programs)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value runprograms does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-25039r442354_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs to "Enabled" "Disable (do not run any programs)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000003
- Vuln IDs
-
- V-223379
- V-99829
- Rule IDs
-
- SV-223379r744265_rule
- SV-108933
Checks: C-25052r744264_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files is set to "Enabled" "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security\fileblock If the value for binaryfiles is set to REG_DWORD = 2, this is not a finding.
Fix: F-25040r442357_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files to "Enabled" "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000004
- Vuln IDs
-
- V-223380
- V-99831
- Rule IDs
-
- SV-223380r508019_rule
- SV-108935
Checks: C-25053r442359_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-25041r442360_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000005
- Vuln IDs
-
- V-223381
- V-99833
- Rule IDs
-
- SV-223381r508019_rule
- SV-108937
Checks: C-25054r442362_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" is set to "Enabled" and "Scan encrypted macros". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security If the value PowerPointBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-25042r442363_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" to "Enabled" and "Scan encrypted macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000006
- Vuln IDs
-
- V-223382
- V-99835
- Rule IDs
-
- SV-223382r508019_rule
- SV-108939
Checks: C-25055r442365_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-25043r442366_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000007
- Vuln IDs
-
- V-223383
- V-99837
- Rule IDs
-
- SV-223383r508019_rule
- SV-108941
Checks: C-25056r442368_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\powerpoint\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-25044r442369_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PT-000008
- Vuln IDs
-
- V-223384
- V-99839
- Rule IDs
-
- SV-223384r508019_rule
- SV-108943
Checks: C-25057r442371_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\powerpoint\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25045r442372_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000009
- Vuln IDs
-
- V-223385
- V-99841
- Rule IDs
-
- SV-223385r508019_rule
- SV-108945
Checks: C-25058r442374_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25046r442375_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000010
- Vuln IDs
-
- V-223386
- V-99843
- Rule IDs
-
- SV-223386r508019_rule
- SV-108947
Checks: C-25059r442377_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25047r442378_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000011
- Vuln IDs
-
- V-223387
- V-99845
- Rule IDs
-
- SV-223387r508019_rule
- SV-108949
Checks: C-25060r442380_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-25048r442381_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000012
- Vuln IDs
-
- V-223388
- V-99847
- Rule IDs
-
- SV-223388r508019_rule
- SV-108951
Checks: C-25061r442383_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-25049r442384_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000013
- Vuln IDs
-
- V-223389
- V-99849
- Rule IDs
-
- SV-223389r508019_rule
- SV-108953
Checks: C-25062r442386_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-25050r442387_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PU-000001
- Vuln IDs
-
- V-223390
- V-99857
- Rule IDs
-
- SV-223390r811502_rule
- SV-108961
Checks: C-25063r811501_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level is set to "Enabled" "By UI (prompted)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\security If the value automationsecuritypublisher is REG_DWORD = 2, this is not a finding.
Fix: F-25051r442390_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level to "Enabled" "By UI (prompted)"
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PU-000002
- Vuln IDs
-
- V-223391
- V-99859
- Rule IDs
-
- SV-223391r508019_rule
- SV-108963
Checks: C-25064r442392_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25052r442393_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PU-000003
- Vuln IDs
-
- V-223392
- V-99861
- Rule IDs
-
- SV-223392r822372_rule
- SV-108965
Checks: C-25065r811503_chk
Set policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros" Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. Values of REG_DWORD = 2 or 4 are also acceptable. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-25053r822371_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings must be set to "Enabled" and "Disable all except digitally signed macros".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-VI-000001
- Vuln IDs
-
- V-223393
- V-99863
- Rule IDs
-
- SV-223393r811507_rule
- SV-108967
Checks: C-25066r811506_chk
Verify the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" and "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value for vbawarnings is REG_DWORD = 3, this is not a finding. Values of REG_DWORD = 2 or 4 are also acceptable. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-25054r442399_fix
Set the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" and select "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-VI-000002
- Vuln IDs
-
- V-223394
- V-99865
- Rule IDs
-
- SV-223394r508019_rule
- SV-108969
Checks: C-25067r442401_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-25055r442402_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-VI-000003
- Vuln IDs
-
- V-223395
- V-99867
- Rule IDs
-
- SV-223395r508019_rule
- SV-108971
Checks: C-25068r442404_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to Enabled. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25056r442405_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to Enabled.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000004
- Vuln IDs
-
- V-223396
- V-99869
- Rule IDs
-
- SV-223396r508019_rule
- SV-108973
Checks: C-25069r442407_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2000files" is REG_DWORD = 2, this is not a finding.
Fix: F-25057r442408_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000005
- Vuln IDs
-
- V-223397
- V-99871
- Rule IDs
-
- SV-223397r508019_rule
- SV-108975
Checks: C-25070r442410_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2003files" is REG_DWORD = 2, this is not a finding.
Fix: F-25058r442411_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000006
- Vuln IDs
-
- V-223398
- V-99873
- Rule IDs
-
- SV-223398r508019_rule
- SV-108977
Checks: C-25071r442413_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio50andearlierfiles" is REG_DWORD = 2, this is not a finding.
Fix: F-25059r442414_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-VI-000007
- Vuln IDs
-
- V-223399
- V-99875
- Rule IDs
-
- SV-223399r508019_rule
- SV-108979
Checks: C-25072r442416_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-25060r442417_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-WD-000001
- Vuln IDs
-
- V-223400
- V-99877
- Rule IDs
-
- SV-223400r508019_rule
- SV-108981
Checks: C-25073r442419_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value for notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-25061r442420_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000002
- Vuln IDs
-
- V-223401
- V-99879
- Rule IDs
-
- SV-223401r508019_rule
- SV-108983
Checks: C-25074r442422_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents is set to "Enabled" "Scan encrypted macros (default)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value WordBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-25062r442423_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents to "Enabled" "Scan encrypted macros (default)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000003
- Vuln IDs
-
- V-223402
- V-99881
- Rule IDs
-
- SV-223402r508019_rule
- SV-108985
Checks: C-25075r442425_chk
Verify the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableinternetfilesinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25063r442426_fix
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000004
- Vuln IDs
-
- V-223403
- V-99883
- Rule IDs
-
- SV-223403r508019_rule
- SV-108987
Checks: C-25076r442428_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview. If the value for disableunsafelocationsinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-25064r442429_fix
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000005
- Vuln IDs
-
- V-223404
- V-99885
- Rule IDs
-
- SV-223404r508019_rule
- SV-108989
Checks: C-25077r442431_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Word\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-25065r442432_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000006
- Vuln IDs
-
- V-223405
- V-99887
- Rule IDs
-
- SV-223405r508019_rule
- SV-108991
Checks: C-25078r442434_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableattachmentsinpv is REG_DWORD = 0, this is not a finding.
Fix: F-25066r442435_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000007
- Vuln IDs
-
- V-223406
- V-99889
- Rule IDs
-
- SV-223406r508019_rule
- SV-108993
Checks: C-25079r442437_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-25067r442438_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000008
- Vuln IDs
-
- V-223407
- V-99891
- Rule IDs
-
- SV-223407r508019_rule
- SV-108995
Checks: C-25080r442440_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix: F-25068r442441_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000009
- Vuln IDs
-
- V-223408
- V-99893
- Rule IDs
-
- SV-223408r508019_rule
- SV-108997
Checks: C-25081r442443_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2000Files is REG_DWORD = 2, this is not a finding.
Fix: F-25069r442444_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000010
- Vuln IDs
-
- V-223409
- V-99895
- Rule IDs
-
- SV-223409r508019_rule
- SV-108999
Checks: C-25082r442446_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2003files is REG_DWORD = 2, this is not a finding.
Fix: F-25070r442447_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000011
- Vuln IDs
-
- V-223410
- V-99897
- Rule IDs
-
- SV-223410r508019_rule
- SV-109001
Checks: C-25083r442449_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2007files is REG_DWORD = 2, this is not a finding.
Fix: F-25071r442450_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000012
- Vuln IDs
-
- V-223411
- V-99899
- Rule IDs
-
- SV-223411r508019_rule
- SV-109003
Checks: C-25084r442452_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word60files is REG_DWORD = 2, this is not a finding.
Fix: F-25072r442453_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000013
- Vuln IDs
-
- V-223412
- V-99901
- Rule IDs
-
- SV-223412r508019_rule
- SV-109005
Checks: C-25085r442455_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word95files is REG_DWORD = 2, this is not a finding.
Fix: F-25073r442456_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000014
- Vuln IDs
-
- V-223413
- V-99903
- Rule IDs
-
- SV-223413r508019_rule
- SV-109007
Checks: C-25086r442458_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word97files is REG_DWORD = 2, this is not a finding.
Fix: F-25074r442459_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000015
- Vuln IDs
-
- V-223414
- V-99905
- Rule IDs
-
- SV-223414r508019_rule
- SV-109009
Checks: C-25087r442461_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value wordxpfiles is REG_DWORD = 2, this is not a finding.
Fix: F-25075r442462_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000016
- Vuln IDs
-
- V-223415
- V-99907
- Rule IDs
-
- SV-223415r508019_rule
- SV-109011
Checks: C-25088r442464_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-25076r442465_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000017
- Vuln IDs
-
- V-223416
- V-99909
- Rule IDs
-
- SV-223416r508019_rule
- SV-109013
Checks: C-25089r442467_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-25077r442468_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-WD-000018
- Vuln IDs
-
- V-223417
- V-99911
- Rule IDs
-
- SV-223417r811509_rule
- SV-109015
Checks: C-25090r811508_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" is set to "Enabled" and "Disable all except digitally signed macros" from the Options. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\word\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. Values of REG_DWORD = 2 or 4 are also acceptable. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-25078r442471_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" to "Enabled" and "Disable all except digitally signed macros" from the Options.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-WD-000019
- Vuln IDs
-
- V-223418
- V-100517
- Rule IDs
-
- SV-223418r508019_rule
- SV-109621
Checks: C-25091r442473_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\filevalidation If the value for enableonload is REG_DWORD = 1, this is not a finding.
Fix: F-25079r442474_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation to "Disabled".