Microsoft Office System 2013 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- DTOO208
- Vuln IDs
-
- V-228516
- V-17670
- Rule IDs
-
- SV-228516r508020_rule
- SV-52755
Checks: C-30749r498826_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Server Settings "Disable the Office client from polling the SharePoint Server for published links" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\portal If the value 'LinkPublishingDisabled' is REG_DWORD = 1, this is not a finding.
Fix: F-30734r498827_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Server Settings "Disable the Office client from polling the SharePoint Server for published links" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO182
- Vuln IDs
-
- V-228517
- V-17627
- Rule IDs
-
- SV-228517r508020_rule
- SV-52719
Checks: C-30750r498829_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> Spelling >> Proofing Data Collection "Improve Proofing Tools" is set to "Disabled". Use the Windows Registry Editor to navigate to the following. HKCU\Software\Policies\Microsoft\Office\15.0\common\ptwatson If the value 'PTWOptIn' is REG_DWORD = 0, this is not a finding.
Fix: F-30735r498830_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO196
- Vuln IDs
-
- V-228518
- V-17560
- Rule IDs
-
- SV-228518r508020_rule
- SV-52745
Checks: C-30751r498832_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center "Allow mix of policy and user locations" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security\trusted locations If the value 'Allow User Locations' is REG_DWORD = 0, this is not a finding.
Fix: F-30736r498833_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center "Allow mix of policy and user locations" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO197
- Vuln IDs
-
- V-228519
- V-17669
- Rule IDs
-
- SV-228519r508020_rule
- SV-52746
Checks: C-30752r498835_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag If the value 'NeverLoadManifests' is REG_DWORD = 1, this is not a finding.
Fix: F-30737r498836_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO203
- Vuln IDs
-
- V-228520
- V-17749
- Rule IDs
-
- SV-228520r508020_rule
- SV-52751
Checks: C-30753r498838_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures If the value 'EnableCreationOfWeakXPSignatures' is REG_DWORD = 1, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" to "Enabled".
Fix: F-30738r498839_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Legacy format signatures" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO204
- Vuln IDs
-
- V-228521
- V-17805
- Rule IDs
-
- SV-228521r508020_rule
- SV-52752
Checks: C-30754r498841_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Suppress external signature services menu item" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures Criteria: If the value 'SuppressExtSigningSvcs' is REG_DWORD = 1, this is not a finding.
Fix: F-30739r498842_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Suppress external signature services menu item" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO206
- Vuln IDs
-
- V-228522
- V-17660
- Rule IDs
-
- SV-228522r508020_rule
- SV-52753
Checks: C-30755r498844_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\fixedformat If the value 'DisableFixedFormatDocProperties' is REG_DWORD = 1, this is not a finding.
Fix: F-30740r498845_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO212
- Vuln IDs
-
- V-228523
- V-17581
- Rule IDs
-
- SV-228523r508020_rule
- SV-52756
Checks: C-30756r498847_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous "Control Blogging" is set to "Enabled (Only SharePoint blogs allowed)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Blog If the value 'DisableBlog' is REG_DWORD = 1, this is not a finding.
Fix: F-30741r498848_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous "Control Blogging" to "Enabled (Only SharePoint blogs allowed)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO402
- Vuln IDs
-
- V-228524
- V-40859
- Rule IDs
-
- SV-228524r508020_rule
- SV-53191
Checks: C-30757r498850_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value HideEnableDisableUpdates is REG_DWORD = 1, this is not a finding.
Fix: F-30742r498851_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO410
- Vuln IDs
-
- V-228525
- V-40880
- Rule IDs
-
- SV-228525r508020_rule
- SV-53212
Checks: C-30758r498853_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >>"Allow including screenshot with Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value 'includescreenshot' is REG_DWORD = 0, this is not a finding.
Fix: F-30743r498854_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center -> "Allow including screenshot with Office Feedback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO412
- Vuln IDs
-
- V-228526
- V-40882
- Rule IDs
-
- SV-228526r508020_rule
- SV-53214
Checks: C-30759r498856_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following hive: HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value 'requireserververification' is REG_DWORD = 1, this is not a finding.
Fix: F-30744r498857_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO416
- Vuln IDs
-
- V-228527
- V-40886
- Rule IDs
-
- SV-228527r508020_rule
- SV-53218
Checks: C-30760r498859_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value 'enablefileobfuscation' is REG_DWORD = 1, this is not a finding.
Fix: F-30745r498860_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO183
- Vuln IDs
-
- V-228528
- V-17664
- Rule IDs
-
- SV-228528r508020_rule
- SV-52720
Checks: C-30761r498862_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Disable Opt-in Wizard on first run" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value 'ShownFirstRunOptin' is REG_DWORD = 1, this is not a finding.
Fix: F-30746r498863_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Disable Opt-in Wizard on first run" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO184
- Vuln IDs
-
- V-228529
- V-17612
- Rule IDs
-
- SV-228529r508020_rule
- SV-52721
Checks: C-30762r498865_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Enable Customer Experience Improvement Program" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common Criteria: If the value 'QMEnable' is REG_DWORD = 0, this is not a finding.
Fix: F-30747r498866_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Enable Customer Experience Improvement Program" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO185
- Vuln IDs
-
- V-228530
- V-17740
- Rule IDs
-
- SV-228530r508020_rule
- SV-52722
Checks: C-30763r498868_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Automatically receive small updates to improve reliability" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common If the value 'UpdateReliabilityData' is REG_DWORD = 0, this is not a finding.
Fix: F-30748r498869_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Automatically receive small updates to improve reliability" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO198
- Vuln IDs
-
- V-228531
- V-17661
- Rule IDs
-
- SV-228531r508020_rule
- SV-52747
Checks: C-30764r498871_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> Fax "Disable Internet Fax feature" to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\services\fax If the value 'NoFax' is REG_DWORD = 1, this is not a finding.
Fix: F-30749r498872_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> Fax "Disable Internet Fax feature" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO345
- Vuln IDs
-
- V-228532
- V-26630
- Rule IDs
-
- SV-228532r508020_rule
- SV-52758
Checks: C-30765r498874_chk
Note: This check is Not Applicable when the use of Office 365 is against the specific DoD instance of O365. The use of Offline Content for Non-DoD instances of O365 is prohibited and it must not allow for personal account synchronization. All non-DoD instances are subject to this requirement. Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" is set to "Enabled: Do not allow Office to connect to the internet". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value 'UseOnlineContent' is REG_DWORD = 0, this is not a finding.
Fix: F-30750r498875_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" to "Enabled: Do not allow Office to connect to the internet".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO403
- Vuln IDs
-
- V-228533
- V-40860
- Rule IDs
-
- SV-228533r508020_rule
- SV-53192
Checks: C-30766r498877_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable First Run Movie" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value 'disablemovie' is REG_DWORD = 1, this is not a finding.
Fix: F-30751r498878_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable First Run Movie" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO404
- Vuln IDs
-
- V-228534
- V-40861
- Rule IDs
-
- SV-228534r508020_rule
- SV-53193
Checks: C-30767r498880_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable Office First Run on application boot" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value 'bootedrtm' is REG_DWORD = 1, this is not a finding.
Fix: F-30752r498881_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable Office First Run on application boot" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO405
- Vuln IDs
-
- V-228535
- V-40862
- Rule IDs
-
- SV-228535r508020_rule
- SV-53194
Checks: C-30768r498883_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Block signing into Office" is set to "Enabled: org ID only". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signin If the value 'signinoptions' is REG_DWORD = 2, this is not a finding.
Fix: F-30753r498884_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Block signing into Office" to "Enabled: org ID only".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO406
- Vuln IDs
-
- V-228536
- V-40863
- Rule IDs
-
- SV-228536r508020_rule
- SV-53195
Checks: C-30769r498886_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Do not automatically hyperlink screenshots" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\gfx If the value 'disablescreenshotautohyperlink' is REG_DWORD = 1, this is not a finding.
Fix: F-30754r498887_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Do not automatically hyperlink screenshots" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO407
- Vuln IDs
-
- V-228537
- V-40864
- Rule IDs
-
- SV-228537r508020_rule
- SV-53196
Checks: C-30770r498889_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous .> "Show OneDrive Sign In" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value 'SkyDriveSignInOption' is REG_DWORD = 0, this is not a finding.
Fix: F-30755r498890_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Show OneDrive Sign In" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO408
- Vuln IDs
-
- V-228538
- V-40875
- Rule IDs
-
- SV-228538r508020_rule
- SV-53207
Checks: C-30771r498892_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value 'disabledefaultservice' is REG_DWORD = 1, this is not a finding.
Fix: F-30756r498893_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO411
- Vuln IDs
-
- V-228539
- V-40881
- Rule IDs
-
- SV-228539r508020_rule
- SV-53213
Checks: C-30772r498895_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value 'enabled' is REG_DWORD = 0, this is not a finding.
Fix: F-30757r498896_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO414
- Vuln IDs
-
- V-228540
- V-40884
- Rule IDs
-
- SV-228540r508020_rule
- SV-53216
Checks: C-30773r498898_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\roaming If the value 'roamingsettingsdisabled' is REG_DWORD = 1, this is not a finding.
Fix: F-30758r498899_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO415
- Vuln IDs
-
- V-228541
- V-40885
- Rule IDs
-
- SV-228541r508020_rule
- SV-53217
Checks: C-30774r498901_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value 'enableupload' is REG_DWORD = 0, this is not a finding.
Fix: F-30759r498902_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO417
- Vuln IDs
-
- V-228542
- V-40887
- Rule IDs
-
- SV-228542r508020_rule
- SV-53219
Checks: C-30775r498904_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value 'enablelogging' is REG_DWORD = 1, this is not a finding.
Fix: F-30760r498905_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO179
- Vuln IDs
-
- V-228543
- V-17759
- Rule IDs
-
- SV-228543r508020_rule
- SV-52714
Checks: C-30776r498907_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value 'OpenDocumentsReadWriteWhileBrowsing' for REG_DWORD = 0, this is not a finding.
Fix: F-30761r498908_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO180
- Vuln IDs
-
- V-228544
- V-17773
- Rule IDs
-
- SV-228544r508020_rule
- SV-52715
Checks: C-30777r498910_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Web Options >> Browsers "Rely on VML for displaying graphics in browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet. If the value 'RelyOnVML' is REG_DWORD = 0, this is not a finding.
Fix: F-30762r498911_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Rely on VML for displaying graphics in browsers" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO193
- Vuln IDs
-
- V-228545
- V-17741
- Rule IDs
-
- SV-228545r557514_rule
- SV-52730
Checks: C-30778r557513_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Security If the value "AutomationSecurity" is REG_DWORD =2, this is not a finding.
Fix: F-30763r498914_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO409
- Vuln IDs
-
- V-228546
- V-40879
- Rule IDs
-
- SV-228546r508020_rule
- SV-53211
Checks: C-30779r498916_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Restrict programmatic access for creating online presentations in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value 'disableprogrammaticaccess' is REG_DWORD = 1, this is not a finding.
Fix: F-30764r498917_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO188
- Vuln IDs
-
- V-228547
- V-17768
- Rule IDs
-
- SV-228547r508020_rule
- SV-52725
Checks: C-30780r498919_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for password protected files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'OpenXMLEncryptProperty' is REG_DWORD = 1, this is not a finding.
Fix: F-30765r498920_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for password protected files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO189
- Vuln IDs
-
- V-228548
- V-17619
- Rule IDs
-
- SV-228548r508020_rule
- SV-52726
Checks: C-30781r498922_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office Open XML files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'OpenXMLEncryption' is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256", this is not a finding.
Fix: F-30766r498969_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office Open XML files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO190
- Vuln IDs
-
- V-228549
- V-17617
- Rule IDs
-
- SV-228549r508020_rule
- SV-52727
Checks: C-30782r498925_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office 97-2003 files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'DefaultEncryption12' is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256", this is not a finding.
Fix: F-30767r498967_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO195
- Vuln IDs
-
- V-228550
- V-17665
- Rule IDs
-
- SV-228550r508020_rule
- SV-52744
Checks: C-30783r498928_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'DisablePasswordUI' is REG_DWORD = 0, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" to "Disabled".
Fix: F-30768r498929_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable password to open UI" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO186
- Vuln IDs
-
- V-228551
- V-17590
- Rule IDs
-
- SV-228551r508020_rule
- SV-52723
Checks: C-30784r498931_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable all Trust Bar notifications for security issues" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\trustcenter If the value 'TrustBar' is REG_DWORD = 0, this is not a finding.
Fix: F-30769r498932_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO192
- Vuln IDs
-
- V-228552
- V-17750
- Rule IDs
-
- SV-228552r508020_rule
- SV-52729
Checks: C-30785r498934_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Load Controls in Forms3" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\keycupoliciesmsvbasecurity If the value 'LoadControlsInForms' exists, this is a finding.
Fix: F-30770r498935_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Load Controls in Forms3" to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO413
- Vuln IDs
-
- V-228553
- V-40883
- Rule IDs
-
- SV-228553r508020_rule
- SV-53215
Checks: C-30786r498937_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value 'disableomexcatalogs' is REG_DWORD = 1, this is not a finding.
Fix: F-30771r498938_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" to "Enabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- DTOO199
- Vuln IDs
-
- V-228554
- V-17765
- Rule IDs
-
- SV-228554r557517_rule
- SV-52748
Checks: C-30787r557516_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value 'DisableCreation' is REG_DWORD = 0, this is not a finding.
Fix: F-30772r498941_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" to "Disabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- DTOO200
- Vuln IDs
-
- V-228555
- V-17583
- Rule IDs
-
- SV-228555r508020_rule
- SV-52749
Checks: C-30788r498943_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm If the value 'IncludeHTML' is REG_DWORD = 0, this is not a finding.
Fix: F-30773r498944_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" to "Disabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- DTOO201
- Vuln IDs
-
- V-228556
- V-17731
- Rule IDs
-
- SV-228556r508020_rule
- SV-52750
Checks: C-30789r498946_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Always require users to connect to verify permission" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value 'RequireConnection' is REG_DWORD = 1, this is not a finding.
Fix: F-30774r498947_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Always require users to connect to verify permission" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO191
- Vuln IDs
-
- V-228557
- V-17547
- Rule IDs
-
- SV-228557r508020_rule
- SV-52728
Checks: C-30790r498949_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "ActiveX Control Initialization" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Security If the value 'UFIControls' exists, this is a finding.
Fix: F-30775r498950_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "ActiveX Control Initialization" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO194
- Vuln IDs
-
- V-228558
- V-17659
- Rule IDs
-
- SV-228558r508020_rule
- SV-52731
Checks: C-30791r498952_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Suppress hyperlink warnings" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value 'DisableHyperLinkWarning' is REG_DWORD = 0, this is not a finding.
Fix: F-30776r498953_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Suppress hyperlink warnings" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO207
- Vuln IDs
-
- V-228559
- V-17605
- Rule IDs
-
- SV-228559r508020_rule
- SV-52754
Checks: C-30792r498955_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Document Information Panel "Document Information Panel Beaconing UI" is set to "Enabled (Always show UI)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\documentinformationpanel If the value 'Beaconing' is REG_DWORD = 1, this is not a finding.
Fix: F-30777r498956_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Document Information Panel "Document Information Panel Beaconing UI" to "Enabled (Always show UI)".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO187
- Vuln IDs
-
- V-228560
- V-17769
- Rule IDs
-
- SV-228560r508020_rule
- SV-52724
Checks: C-30793r498958_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'DRMEncryptProperty' is REG_DWORD = 1, this is not a finding.
Fix: F-30778r498959_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO321
- Vuln IDs
-
- V-228561
- V-26704
- Rule IDs
-
- SV-228561r508020_rule
- SV-52757
Checks: C-30794r498961_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encrypt document properties" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value 'EncryptDocProps' is REG_DWORD = 1, this is not a finding.
Fix: F-30779r498962_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encrypt document properties" to "Enabled".
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- DTOO401
- Vuln IDs
-
- V-228562
- V-40858
- Rule IDs
-
- SV-228562r508020_rule
- SV-53190
Checks: C-30795r498964_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" is set to "Enabled". Verify the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" is set to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:" both point to an Intranet system. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value EnableAutomaticUpdates is REG_DWORD = 1, this is not a finding. If the registry key is missing, this is an Open finding. This setting is, by default, enabled and must be explicitly configured to be disabled. HKLM\software\policies\Microsoft\Windows\WindowsUpdate Criteria: If the value of WUServer and WUStatusServer are populated with an Intranet system, this is not a finding.
Fix: F-30780r498971_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" to "Enabled". Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:"to point to an Intranet system.