Microsoft Office System 2007
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V4R11). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 35 rules matched cleanly.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO191 - Office
- Vuln IDs
-
- V-17547
- Rule IDs
-
- SV-18643r2_rule
Checks: C-18858r3_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “ActiveX Control Initialization” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value UFIControls exists, this is a finding.
Fix: F-17469r3_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “ActiveX Control Initialization” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO196 - Office
- Vuln IDs
-
- V-17560
- Rule IDs
-
- SV-18659r1_rule
Checks: C-18861r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings -> Trust Center “Allow mix of policy and user locations” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security\Trusted Locations Criteria: If the value Allow User Locations is REG_DWORD = 0, this is not a finding.
Fix: F-17477r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings -> Trust Center “Allow mix of policy and user locations” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- DTOO181 - Office
- Vuln IDs
-
- V-17561
- Rule IDs
-
- SV-18661r1_rule
Checks: C-18862r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options -> Browsers “Allow PNG as an output format” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Internet Criteria: If the value AllowPNG is REG_DWORD = 0, this is not a finding.
Fix: F-17478r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options -> Browsers “Allow PNG as an output format” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO213 - Office 2007
- Vuln IDs
-
- V-17565
- Rule IDs
-
- SV-18669r1_rule
Checks: C-18866r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Miscellaneous “Block updates from the Office Update Site from applying” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\OfficeUpdate Criteria: If the value BlockUpdates is REG_DWORD = 1, this is not a finding.
Fix: F-17483r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Miscellaneous “Block updates from the Office Update Site from applying” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO212 - Office
- Vuln IDs
-
- V-17581
- Rule IDs
-
- SV-18701r1_rule
Checks: C-18882r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Miscellaneous “Control Blogging” will be set to “Enabled (Only SharePoint blogs allowed)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Blog Criteria: If the value DisableBlog is REG_DWORD = 1, this is not a finding.
Fix: F-17500r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Miscellaneous “Control Blogging” will be set to “Enabled (Only SharePoint blogs allowed)”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO200 - Office 2007
- Vuln IDs
-
- V-17583
- Rule IDs
-
- SV-18782r1_rule
Checks: C-18920r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Allow users with earlier versions of Office to read with browsers” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\DRM Criteria: If the value IncludeHTML is REG_DWORD = 0, this is not a finding.
Fix: F-17543r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Allow users with earlier versions of Office to read with browsers” will be set to "Disabled". "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO177 - Office
- Vuln IDs
-
- V-17588
- Rule IDs
-
- SV-18714r1_rule
Checks: C-18888r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options “Disable access to updates, add-ins, and patches on the Office Online website” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Internet Criteria: If the value DisableDownloadCenterAccess is REG_DWORD = 1, this is not a finding.
Fix: F-17506r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options “Disable access to updates, add-ins, and patches on the Office Online website” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO186 - Office
- Vuln IDs
-
- V-17590
- Rule IDs
-
- SV-18717r1_rule
Checks: C-18890r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable all Trust Bar notifications for security issues” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\TrustCenter Criteria: If the value TrustBar is REG_DWORD = 0, this is not a finding.
Fix: F-17508r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable all Trust Bar notifications for security issues” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO207 - Office 2007
- Vuln IDs
-
- V-17605
- Rule IDs
-
- SV-18740r1_rule
Checks: C-18907r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Document Information Panel “Document Information Panel Beaconing UI” will be set to “Enabled (Always show UI)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\DocumentInformationPanel Criteria: If the value Beaconing is REG_DWORD = 1, this is not a finding.
Fix: F-17523r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Document Information Panel “Document Information Panel Beaconing UI” will be set to “Enabled (Always show UI)”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO184 - Office 2007
- Vuln IDs
-
- V-17612
- Rule IDs
-
- SV-18747r1_rule
Checks: C-18910r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Privacy -> Trust Center “Enable Customer Experience Improvement Program” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common Criteria: If the value QMEnable is REG_DWORD =0, this is not a finding.
Fix: F-17526r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Privacy -> Trust Center “Enable Customer Experience Improvement Program” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO190 - Office 2007
- Vuln IDs
-
- V-17617
- Rule IDs
-
- SV-18755r1_rule
Checks: C-18913r1_chk
If Office 2007 PRE SP2 NON XP OS: The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office 97-2003 files” will minimally be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the minimum value DefaultEncryption is REG_SZ = “Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128”, this is not a finding. If Office 2007 PRE SP2 with XP OS: The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office 97-2003 files” will minimally be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 128,128)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the minimum value DefaultEncryption is REG_SZ = “Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 128,128”, this is not a finding. If Office 2007 SP2 NON XP OS's: The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office 97-2003 files” will minimally be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the minimum value DefaultEncryption12 is REG_SZ = “Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128”, this is not a finding. If Office 2007 SP2 on XP OS: The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office 97-2003 files” will minimally be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 128,128)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the minimum value DefaultEncryption12 is REG_SZ = “Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 128,128”, this is not a finding. NOTE: “Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128" or “Microsoft Enhanced RSA and AES Cryptographic Provider(Prototype),AES 128,128" is minimum setting required where can be up to key length of 256 if environment will support as “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)" or “Enabled Microsoft Enhanced RSA and AES Cryptographic Provider(Prototype),AES 256,256".
Fix: F-17530r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office 97-2003 files” will be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128)” for NON XP OS's or “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype?,AES 128,128)” for XP os. NOTE: “Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128" is minimum setting required where can be up to key length of 256 if environment will support as “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)” or “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 256,256)”
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO189 - Office 2007
- Vuln IDs
-
- V-17619
- Rule IDs
-
- SV-18758r1_rule
Checks: C-18914r1_chk
If Office 2007 NON XP OS: The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office Open XML files” will minimally be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the minimum value OpenXMLEncryption is REG_SZ = “Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128”, this is not a finding. If Office 2007 with XP OS: The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office Open XML files” will minimally be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 128,128)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the minimum value OpenXMLEncryption is REG_SZ = “Microsoft Enhanced RSA and AES Cryptographic Provider(Prototype),AES 128,128”, this is not a finding. NOTE: “Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128" or “Microsoft Enhanced RSA and AES Cryptographic Provider(Prototype),AES 128,128" is minimum setting required where can be up to key length of 256 if environment will support as “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)" or “Enabled Microsoft Enhanced RSA and AES Cryptographic Provider(Prototype),AES 256,256".
Fix: F-17531r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Encryption type for password protected Office Open XML files” will be set to “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128)” for NON XP OS's or “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 128,128)” for XP OS. NOTE: “Microsoft Enhanced RSA and AES Cryptographic Provider,AES 128,128" is minimum setting required where can be up to key length of 256 if environment will support as “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)” or “Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype),AES 256,256)”
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO182 - Office
- Vuln IDs
-
- V-17627
- Rule IDs
-
- SV-18770r1_rule
Checks: C-18917r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ Spelling -> Proofing Data Collection “Improve Proofing Tools” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\PTWatson Criteria: If the value PTWOptIn is REG_DWORD = 0, this is not a finding.
Fix: F-17537r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ Spelling -> Proofing Data Collection “Improve Proofing Tools” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO205 - Office 2007
- Vuln IDs
-
- V-17653
- Rule IDs
-
- SV-18802r1_rule
Checks: C-18924r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Office Diagnostics “Disable Check For Solutions” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\OffDiag Criteria: If the value DisableCheckForSolutions is REG_DWORD = 1, this is not a finding.
Fix: F-17551r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Office Diagnostics “Disable Check For Solutions” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO194 - Office
- Vuln IDs
-
- V-17659
- Rule IDs
-
- SV-18814r1_rule
Checks: C-18930r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable hyperlink warnings” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the value DisableHyperLinkWarning is REG_DWORD = 0, this is not a finding.
Fix: F-17557r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable hyperlink warnings” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO206 - Office
- Vuln IDs
-
- V-17660
- Rule IDs
-
- SV-18816r1_rule
Checks: C-18931r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Microsoft Save As PDF and XPS add-ins “Disable inclusion of document properties in PDF and XPS output” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\FixedFormat Criteria: If the value DisableFixedFormatDocProperties is REG_DWORD = 1, this is not a finding.
Fix: F-17558r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Microsoft Save As PDF and XPS add-ins “Disable inclusion of document properties in PDF and XPS output” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO198 - Office
- Vuln IDs
-
- V-17661
- Rule IDs
-
- SV-18818r1_rule
Checks: C-18932r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Services -> Fax “Disable Internet Fax feature” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Services\Fax Criteria: If the value NoFax is REG_DWORD = 1, this is not a finding.
Fix: F-17559r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Services -> Fax “Disable Internet Fax feature” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO202 - Office
- Vuln IDs
-
- V-17662
- Rule IDs
-
- SV-18820r1_rule
Checks: C-18933r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Disable Microsoft Passport service for content with restricted permission” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\DRM Criteria: If the value DisablePassportCertification is REG_DWORD = 1, this is not a finding.
Fix: F-17560r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Disable Microsoft Passport service for content with restricted permission” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO183 - Office
- Vuln IDs
-
- V-17664
- Rule IDs
-
- SV-18824r1_rule
Checks: C-18935r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Privacy -> Trust Center “Disable Opt-in Wizard on first run” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\General Criteria: If the value ShownOptIn is REG_DWORD = 1, this is not a finding.
Fix: F-17562r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Privacy -> Trust Center “Disable Opt-in Wizard on first run” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO195 - Office
- Vuln IDs
-
- V-17665
- Rule IDs
-
- SV-18826r1_rule
Checks: C-18936r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable password to open UI” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the value DisablePasswordUI is REG_DWORD = 0, this is not a finding.
Fix: F-17563r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable password to open UI” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO197 - Office
- Vuln IDs
-
- V-17669
- Rule IDs
-
- SV-18834r1_rule
Checks: C-18940r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Smart Documents (Word, Excel) “Disable Smart Document's use of manifests” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag Criteria: If the value NeverLoadManifests is REG_DWORD = 1, this is not a finding.
Fix: F-17567r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Smart Documents (Word, Excel) “Disable Smart Document's use of manifests” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO208 - Office
- Vuln IDs
-
- V-17670
- Rule IDs
-
- SV-18836r1_rule
Checks: C-18941r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Server Settings “Disable the Office client from polling the Office server for published links” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Portal Criteria: If the value LinkPublishingDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-17568r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Server Settings “Disable the Office client from polling the Office server for published links” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO201 - Office
- Vuln IDs
-
- V-17731
- Rule IDs
-
- SV-18906r1_rule
Checks: C-18997r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Always require users to connect to verify permission” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\DRM Criteria: If the value requireConnection is REG_DWORD = 1, this is not a finding.
Fix: F-17631r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Always require users to connect to verify permission” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO185 - Office
- Vuln IDs
-
- V-17740
- Rule IDs
-
- SV-18922r1_rule
Checks: C-19004r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Privacy -> Trust Center “Automatically receive small updates to improve reliability” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common Criteria: If the value UpdateReliabilityData is REG_DWORD = 0, this is not a finding.
Fix: F-17640r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Privacy -> Trust Center “Automatically receive small updates to improve reliability” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO193 - Office
- Vuln IDs
-
- V-17741
- Rule IDs
-
- SV-18924r1_rule
Checks: C-19005r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Automation Security” will be set to “Enabled (Use application macro security level)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix: F-17641r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Automation Security” will be set to “Enabled (Use application macro security level)”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO203 - Office
- Vuln IDs
-
- V-17749
- Rule IDs
-
- SV-18937r1_rule
Checks: C-19011r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Signing “Legacy format signatures” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Signatures Criteria: If the value XPCompatibleSignatureFormat is REG_DWORD = 1, this is not a finding.
Fix: F-17648r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Signing “Legacy format signatures” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO192 - Office
- Vuln IDs
-
- V-17750
- Rule IDs
-
- SV-18939r2_rule
Checks: C-19012r4_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Load Controls in Forms3” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\VBA\Security Criteria: If the value LoadControlsInForms exists, this is a finding.
Fix: F-17649r4_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Load Controls in Forms3” will be set to “Diabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO179 - Office
- Vuln IDs
-
- V-17759
- Rule IDs
-
- SV-18956r1_rule
Checks: C-19022r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options -> Files “Open Office documents as read/write while browsing” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Internet Criteria: If the value OpenDocumentsReadWriteWhileBrowsing is REG_DWORD = 0, this is not a finding.
Fix: F-17658r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options -> Files “Open Office documents as read/write while browsing” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO199 - Office
- Vuln IDs
-
- V-17765
- Rule IDs
-
- SV-18968r1_rule
Checks: C-19028r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Prevent users from changing permissions on rights managed content” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\DRM Criteria: If the value DisableCreation is REG_DWORD = 0, this is not a finding.
Fix: F-17664r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Manage Restricted Permissions “Prevent users from changing permissions on rights managed content” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO178 - Office
- Vuln IDs
-
- V-17767
- Rule IDs
-
- SV-18972r1_rule
Checks: C-19030r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options “Prevents users from uploading document templates to the Office Online community” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Internet Criteria: If the value DisableCustomerSubmittedUpload is REG_DWORD = 1, this is not a finding.
Fix: F-17666r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options “Prevents users from uploading document templates to the Office Online community” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO188 - Office
- Vuln IDs
-
- V-17768
- Rule IDs
-
- SV-18974r1_rule
Checks: C-19031r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Protect document metadata for password protected files” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the value OpenXMLEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-17667r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Protect document metadata for password protected files” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO187 - Office
- Vuln IDs
-
- V-17769
- Rule IDs
-
- SV-18976r1_rule
Checks: C-19032r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Protect document metadata for rights managed Office Open XML Files” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security Criteria: If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-17668r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Protect document metadata for rights managed Office Open XML Files” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO180 - Office
- Vuln IDs
-
- V-17773
- Rule IDs
-
- SV-18983r1_rule
Checks: C-19036r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options -> Browsers “Rely on VML for displaying graphics in browsers” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Internet Criteria: If the value RelyOnVML is REG_DWORD = 0, this is not a finding.
Fix: F-17672r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options -> Browsers “Rely on VML for displaying graphics in browsers” will be set to “Disabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO204 - Office
- Vuln IDs
-
- V-17805
- Rule IDs
-
- SV-19036r1_rule
Checks: C-19063r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Signing “Suppress external signature services menu item” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Signatures Criteria: If the value SuppressExtSigningSvcs is REG_DWORD = 1, this is not a finding.
Fix: F-17706r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Signing “Suppress external signature services menu item” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO287
- Vuln IDs
-
- V-25884
- Rule IDs
-
- SV-32370r1_rule
Checks: C-32765r1_chk
To determine what SP level is installed, Start any Office application, such as Word. Click on the Office Menu Button (upper left), Click "Word options" at the bottom of the menu, select "Resources" from the left column: The version number will be displayed alongside the "About" button on the right hand side display. If the "About" box information does not display a most current service pack, then this is a finding. Current Supported Service Pack Office 2007 – SP2 (See Severity Override). Severity Override: Unsupported Service Packs will be upgraded to a Category I finding. This includes the following: Office 2007 - prior to SP2.
Fix: F-28840r1_fix
Install the most current Office 2007 service pack.