Microsoft Office System 2013 Security Technical Implementation Guide

  • Version/Release: V2R2
  • Published: 2024-06-14
  • Released: 2024-07-24
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
b
Office client polling of SharePoint servers published links must be disabled.
AC-3 - Medium - CCI-000213 - V-228516 - SV-228516r960792_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
DTOO208
Vuln IDs
  • V-228516
  • V-17670
Rule IDs
  • SV-228516r960792_rule
  • SV-52755
Users of Office applications can see and use links to Microsoft Office SharePoint Server sites from those applications. Administrators configure published links to Office applications during initial deployment, and can add or change links as part of regular operations. These links appear on the My SharePoint Sites tab of the Open, Save, and Save As dialog boxes when opening and saving documents from these applications. Links can be targeted so that they only appear to users who are members of particular audiences. If a malicious person gains access to the list of published links, they could modify the links to point to unapproved sites, which could make sensitive data vulnerable to exposure.
Checks: C-30749r498826_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Server Settings "Disable the Office client from polling the SharePoint Server for published links" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\portal If the value 'LinkPublishingDisabled' is REG_DWORD = 1, this is not a finding.

Fix: F-30734r498827_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Server Settings "Disable the Office client from polling the SharePoint Server for published links" to "Enabled".

b
The Help Improve Proofing Tools feature for Office must be configured.
CM-6 - Medium - CCI-000366 - V-228517 - SV-228517r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO182
Vuln IDs
  • V-228517
  • V-17627
Rule IDs
  • SV-228517r961863_rule
  • SV-52719
The "Help Improve Proofing Tools" feature collects data about use of the Proofing Tools, such as additions to the custom dictionary, and sends it to Microsoft. After about six months, the feature stops sending data to Microsoft and deletes the data collection file from the user's computer. Although this feature does not intentionally collect personal information, some of the content sent could include items that were marked as spelling or grammar errors, such as proper names and account numbers. However, any numbers such as account numbers, street addresses, and phone numbers are converted to zeroes when the data is collected. Microsoft uses this information solely to improve the effectiveness of the Office Proofing Tools, not to identify users. By default, this feature is enabled, if users choose to participate in the Customer Experience Improvement Program (CEIP). If an organization has policies that govern the use of external resources such as the CEIP, allowing the use of the "Help Improve Proofing Tools" feature might cause them to violate these policies.
Checks: C-30750r498829_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> Spelling >> Proofing Data Collection "Improve Proofing Tools" is set to "Disabled". Use the Windows Registry Editor to navigate to the following. HKCU\Software\Policies\Microsoft\Office\15.0\common\ptwatson If the value 'PTWOptIn' is REG_DWORD = 0, this is not a finding.

Fix: F-30735r498830_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" to "Disabled".

b
A mix of policy and user locations for Office Products must be disallowed.
CM-6 - Medium - CCI-000366 - V-228518 - SV-228518r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO196
Vuln IDs
  • V-228518
  • V-17560
Rule IDs
  • SV-228518r961863_rule
  • SV-52745
When Microsoft Office files are opened from trusted locations, all the content in the files is enabled and active. Users are not notified about any potential risks that might be contained in the files, such as unsigned macros, ActiveX controls, or links to content on the Internet. By default, users can specify any location as a trusted location, and a computer can have a combination of user-created, OCT-created, and Group Policy–created trusted locations.
Checks: C-30751r498832_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center "Allow mix of policy and user locations" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security\trusted locations If the value 'Allow User Locations' is REG_DWORD = 0, this is not a finding.

Fix: F-30736r498833_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center "Allow mix of policy and user locations" to "Disabled".

b
Smart Documents use of Manifests in Office must be disallowed.
CM-6 - Medium - CCI-000366 - V-228519 - SV-228519r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO197
Vuln IDs
  • V-228519
  • V-17669
Rule IDs
  • SV-228519r961863_rule
  • SV-52746
An XML expansion pack is the group of files that constitutes a Smart Document in Excel and Word. One or more components that provide the logic needed for a Smart Document are packaged by using an XML expansion pack. These components can include any type of file, including XML schemas, Extensible Stylesheet Language Transforms (XSLTs), dynamic-link libraries (DLLs), and image files, as well as additional XML files, HTML files, Word files, Excel files, and text files. The key component to building an XML expansion pack is creating an XML expansion pack manifest file. By creating this file, the locations of all files that make up the XML expansion pack are specified, as well as information that instructs Office 2013 how to set up the files for the Smart Document. The XML expansion pack can also contain information about how to set up other files, such as how to install and register a COM object required by the XML expansion pack. XML expansion packs can be used to initialize and load malicious code, which might affect the stability of a computer and lead to data loss. Office applications can load an XML expansion pack manifest file with a Smart Document.
Checks: C-30752r498835_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag If the value 'NeverLoadManifests' is REG_DWORD = 1, this is not a finding.

Fix: F-30737r498836_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" to "Enabled".

b
Legacy format signatures must be enabled.
CM-6 - Medium - CCI-000366 - V-228520 - SV-228520r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO203
Vuln IDs
  • V-228520
  • V-17749
Rule IDs
  • SV-228520r961863_rule
  • SV-52751
Office applications use the XML-based XMLDSIG format to attach digital signatures to documents, including Office 97-2003 binary documents. XMLDSIG signatures are not recognized by Office 2003 applications or previous versions. If an Office user opens an Excel, PowerPoint, or Word binary document with an XMLDSIG signature attached, the signature will be lost.
Checks: C-30753r498838_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures If the value 'EnableCreationOfWeakXPSignatures' is REG_DWORD = 1, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" to "Enabled".

Fix: F-30738r498839_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Legacy format signatures" to "Enabled".

b
External Signature Services Menu for Office must be suppressed.
CM-6 - Medium - CCI-000366 - V-228521 - SV-228521r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO204
Vuln IDs
  • V-228521
  • V-17805
Rule IDs
  • SV-228521r961863_rule
  • SV-52752
Users can select Add Signature Services (from the Signature Line drop-down menu on the Insert tab of the Ribbon in Excel 2013, PowerPoint 2013, and Word 2013) to see a list of signature service providers on the Microsoft Office website. If an organization has policies that govern the use of external resources such as signature providers or Office Marketplace, allowing users to access the Add Signature Services menu item might enable them to violate those policies.
Checks: C-30754r498841_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Suppress external signature services menu item" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures Criteria: If the value 'SuppressExtSigningSvcs' is REG_DWORD = 1, this is not a finding.

Fix: F-30739r498842_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Suppress external signature services menu item" to "Enabled".

b
Inclusion of document properties for PDF and XPS output must be disallowed.
CM-6 - Medium - CCI-000366 - V-228522 - SV-228522r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO206
Vuln IDs
  • V-228522
  • V-17660
Rule IDs
  • SV-228522r961863_rule
  • SV-52753
If the Microsoft Save as PDF or XPS Add-in for Microsoft Office Programs is installed, document properties are saved as metadata when users save or publish files using the PDF or XPS commands in Access 2013, Excel 2013, InfoPath 2013, PowerPoint 2013, and Word 2013 using the PDF or XPS or Publish. If this metadata contains sensitive information, saving it with the file could compromise security.
Checks: C-30755r498844_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\fixedformat If the value 'DisableFixedFormatDocProperties' is REG_DWORD = 1, this is not a finding.

Fix: F-30740r498845_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" to "Enabled".

b
Blogging entries created from inside Office products must be configured for SharePoint only.
CM-6 - Medium - CCI-000366 - V-228523 - SV-228523r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO212
Vuln IDs
  • V-228523
  • V-17581
Rule IDs
  • SV-228523r961863_rule
  • SV-52756
The blogging feature in Office products enables users to compose blog entries and post them to their blogs directly from Office, without using any additional software. By default, users can post blog entries to any compatible blogging service provider, including Windows Live Spaces, Blogger, a SharePoint or Community Server site, and others. Leaving this capability enabled introduces the risk of users posting confidential and FOUO date to non-DoD sites.
Checks: C-30756r498847_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous "Control Blogging" is set to "Enabled (Only SharePoint blogs allowed)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Blog If the value 'DisableBlog' is REG_DWORD = 1, this is not a finding.

Fix: F-30741r498848_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous "Control Blogging" to "Enabled (Only SharePoint blogs allowed)".

b
The Enable Updates and Disable Updates options in the UI must be hidden from users.
CM-6 - Medium - CCI-000366 - V-228524 - SV-228524r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO402
Vuln IDs
  • V-228524
  • V-40859
Rule IDs
  • SV-228524r961863_rule
  • SV-53191
This policy setting allows the user interface (UI) options to enable or disable Office automatic updates to be hidden from users. These options are found in the Product Information area of all Office applications installed via Click-to-Run. This policy setting has no effect on Office applications installed via Windows Installer. If this policy setting is enabled, the "Enable Updates" and "Disable Updates" options in the UI are hidden from users. If this policy setting is not configured, the "Enable Updates" and "Disable Updates" options are visible, and users can enable or disable Office automatic updates from the UI.
Checks: C-30757r498850_chk

Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value HideEnableDisableUpdates is REG_DWORD = 1, this is not a finding.

Fix: F-30742r498851_fix

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled".

b
When using the Office Feedback tool, the ability to include a screenshot must be disabled.
CM-6 - Medium - CCI-000366 - V-228525 - SV-228525r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO410
Vuln IDs
  • V-228525
  • V-40880
Rule IDs
  • SV-228525r961863_rule
  • SV-53212
The "Office Feedback" tool, also called "Send-a-Smile", allows a user to click on an icon and send feedback to Microsoft. The "Office Feedback" Tool must be configured to be disabled. In the event that the Office Feedback Tool has not been configured correctly as disabled, this policy configures whether the uploading of screenshots via the tool is allowed and should also be disabled. Uploading screenshots to a commercial vendor from a DoD computer may unintentionally reveal configuration and/or FOUO content.
Checks: C-30758r498853_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >>"Allow including screenshot with Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value 'includescreenshot' is REG_DWORD = 0, this is not a finding.

Fix: F-30743r498854_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center -> "Allow including screenshot with Office Feedback" to "Disabled".

b
The ability to run unsecure Office apps must be disabled.
CM-6 - Medium - CCI-000366 - V-228526 - SV-228526r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO412
Vuln IDs
  • V-228526
  • V-40882
Rule IDs
  • SV-228526r961863_rule
  • SV-53214
Unsecure apps for Office, which are apps that have web page or catalog locations that are not SSL-secured (https://), and/or are not in users' Internet zones may allow data to be transmitted/accessed via clear text to outside sources. By configuring this policy to be disabled, users will be prevented from transmitting/accessing data in a nonsecure manner.
Checks: C-30759r498856_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following hive: HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value 'requireserververification' is REG_DWORD = 1, this is not a finding.

Fix: F-30744r498857_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" to "Disabled".

b
The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
CM-6 - Medium - CCI-000366 - V-228527 - SV-228527r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO416
Vuln IDs
  • V-228527
  • V-40886
Rule IDs
  • SV-228527r961863_rule
  • SV-53218
This policy setting configures the Office Telemetry Agent to disguise, or obfuscate, certain file properties that are reported in telemetry data. If this policy setting is enabled, Office Telemetry Agent obfuscates the file name, file path, and title of Office documents before uploading telemetry data to the shared folder. If this policy setting is disabled or not configured, the Office Telemetry Agent uploads telemetry data that shows the full file name, file path, and title of all Office documents.
Checks: C-30760r498859_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value 'enablefileobfuscation' is REG_DWORD = 1, this is not a finding.

Fix: F-30745r498860_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" to "Enabled".

b
The Opt-In Wizard must be disabled.
CM-7 - Medium - CCI-000381 - V-228528 - SV-228528r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO183
Vuln IDs
  • V-228528
  • V-17664
Rule IDs
  • SV-228528r960963_rule
  • SV-52720
The Opt-in Wizard displays the first time users run a 2013 Microsoft Office application, which allows them to opt into Internet-based services that will help improve their Office experience, such as Microsoft Update, the Customer Experience Improvement Program, Office Diagnostics, and Online Help. If an organization has policies that govern the use of such external resources, allowing users to opt in to these services might cause them to violate the policies.
Checks: C-30761r498862_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Disable Opt-in Wizard on first run" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value 'ShownFirstRunOptin' is REG_DWORD = 1, this is not a finding.

Fix: F-30746r498863_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Disable Opt-in Wizard on first run" to "Enabled".

b
The Customer Experience Improvement Program for Office must be disabled.
CM-7 - Medium - CCI-000381 - V-228529 - SV-228529r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO184
Vuln IDs
  • V-228529
  • V-17612
Rule IDs
  • SV-228529r960963_rule
  • SV-52721
When users choose to participate in the Customer Experience Improvement Program (CEIP), Office applications automatically send information to Microsoft about how the applications are used. This information is combined with other CEIP data to help Microsoft solve problems and to improve the products and features customers use most often. This feature does not collect users' names, addresses, or any other identifying information except the IP address that is used to send the data. By default, users have the opportunity to opt into participation in the CEIP the first time they run an Office application. If an organization has policies that govern the use of external resources such as the CEIP, allowing users to opt in to the program might cause them to violate these policies.
Checks: C-30762r498865_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Enable Customer Experience Improvement Program" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common Criteria: If the value 'QMEnable' is REG_DWORD = 0, this is not a finding.

Fix: F-30747r498866_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Enable Customer Experience Improvement Program" to "Disabled".

b
Automatic receiving of small updates to improve reliability must be disallowed.
CM-7 - Medium - CCI-000381 - V-228530 - SV-228530r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO185
Vuln IDs
  • V-228530
  • V-17740
Rule IDs
  • SV-228530r960963_rule
  • SV-52722
Having access to updates, add-ins, and patches on the Office Online website can help users ensure computers are up to date and equipped with the latest security patches. However, to ensure updates are tested and applied in a consistent manner, many organizations prefer to roll out updates using a centralized mechanism such as Microsoft Systems Center or Windows Server Update Services. By default, users are allowed to download updates, add-ins, and patches from the Office Online Web site to keep their Office applications running smoothly and securely. If an organization has policies that govern the use of external resources such as Office Online, allowing users to download updates might cause them to violate these policies.
Checks: C-30763r498868_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Automatically receive small updates to improve reliability" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common If the value 'UpdateReliabilityData' is REG_DWORD = 0, this is not a finding.

Fix: F-30748r498869_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Automatically receive small updates to improve reliability" to "Disabled".

b
The Internet Fax Feature must be disabled.
CM-7 - Medium - CCI-000381 - V-228531 - SV-228531r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO198
Vuln IDs
  • V-228531
  • V-17661
Rule IDs
  • SV-228531r960963_rule
  • SV-52747
Excel, PowerPoint, and Word users can use the Internet Fax feature to send documents to fax recipients through an Internet fax service provider. If your organization has policies that govern the time, place, or manner in which faxes are sent, this feature could help users evade those policies. By default, Office users can use the Internet Fax feature.
Checks: C-30764r498871_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> Fax "Disable Internet Fax feature" to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\services\fax If the value 'NoFax' is REG_DWORD = 1, this is not a finding.

Fix: F-30749r498872_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> Fax "Disable Internet Fax feature" to "Enabled".

b
Online content options must be configured for offline content availability.
CM-7 - Medium - CCI-000381 - V-228532 - SV-228532r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO345
Vuln IDs
  • V-228532
  • V-26630
Rule IDs
  • SV-228532r960963_rule
  • SV-52758
The Office 2013 Help system automatically searches MicrosoftOffice.com for content when a computer is connected to the Internet. Users can change this default by clearing the Search Microsoft Office.com for Help content when I'm connected to the Internet check box in the Privacy Options section of the Trust Center. If an organization has policies that govern the use of external resources such as Office.com, allowing the Help system to download content might cause users to violate these policies.
Checks: C-30765r498874_chk

Note: This check is Not Applicable when the use of Office 365 is against the specific DoD instance of O365. The use of Offline Content for Non-DoD instances of O365 is prohibited and it must not allow for personal account synchronization. All non-DoD instances are subject to this requirement. Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" is set to "Enabled: Do not allow Office to connect to the internet". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value 'UseOnlineContent' is REG_DWORD = 0, this is not a finding.

Fix: F-30750r498875_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" to "Enabled: Do not allow Office to connect to the internet".

b
The video informing a user about signing into Office365 must be disabled.
CM-7 - Medium - CCI-000381 - V-228533 - SV-228533r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO403
Vuln IDs
  • V-228533
  • V-40860
Rule IDs
  • SV-228533r960963_rule
  • SV-53192
Office 365 is a subscription-based service which offers access to various Microsoft Office applications. Access to Office 365 will not be permitted; only locally installed and configured Office 2013 installations will be used. Since the ability to sign into Office 365 will be disabled, this policy, which determines whether a video about signing into Office365 is played when Office first runs, will also be disabled.
Checks: C-30766r498877_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable First Run Movie" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value 'disablemovie' is REG_DWORD = 1, this is not a finding.

Fix: F-30751r498878_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable First Run Movie" to "Enabled".

b
The first-run prompt to sign into Office365 must be disabled.
CM-7 - Medium - CCI-000381 - V-228534 - SV-228534r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO404
Vuln IDs
  • V-228534
  • V-40861
Rule IDs
  • SV-228534r960963_rule
  • SV-53193
Office 365 functionality allows users to provide credentials for accessing Office 365 using either their Microsoft Account, or the user ID assigned by the organization. Access to Office 365 will not be permitted; only locally installed and configured Office 2013 installations will be used. Since the ability to sign into Office 365 will be disabled, this policy, which determines whether the Office First Run comes up on first application boot if not previously viewed, will also be disabled.
Checks: C-30767r498880_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable Office First Run on application boot" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value 'bootedrtm' is REG_DWORD = 1, this is not a finding.

Fix: F-30752r498881_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable Office First Run on application boot" to "Enabled".

b
The ability to sign into Office365 must be disabled.
CM-7 - Medium - CCI-000381 - V-228535 - SV-228535r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO405
Vuln IDs
  • V-228535
  • V-40862
Rule IDs
  • SV-228535r960963_rule
  • SV-53194
Office 2013 can be configured to prompt users for credentials to Office365 using either their Microsoft Account or the user ID assigned by an organization for accessing Office 365. Access to Office 365 will not be permitted and only locally installed and configured Office installations will be used.
Checks: C-30768r498883_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Block signing into Office" is set to "Enabled: org ID only". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signin If the value 'signinoptions' is REG_DWORD = 2, this is not a finding.

Fix: F-30753r498884_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Block signing into Office" to "Enabled: org ID only".

b
The ability to automatically hyperlink screenshots within Word, PowerPoint, Excel and Outlook must be disabled.
CM-7 - Medium - CCI-000381 - V-228536 - SV-228536r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO406
Vuln IDs
  • V-228536
  • V-40863
Rule IDs
  • SV-228536r960963_rule
  • SV-53195
The ability to automatically bind hyperlink to a screenshot inserted through the Insert Screenshot tool introduces the possibility of a malicious URL or website being imbedded in the Word, PowerPoint, Excel or Outlook document. Disabling the hyperlink in those screenshots will ensure users do not have the ability to directly open the hyperlinks.
Checks: C-30769r498886_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Do not automatically hyperlink screenshots" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\gfx If the value 'disablescreenshotautohyperlink' is REG_DWORD = 1, this is not a finding.

Fix: F-30754r498887_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Do not automatically hyperlink screenshots" to "Enabled".

b
The prompt to save to OneDrive (formerly SkyDrive) must be disabled.
CM-7 - Medium - CCI-000381 - V-228537 - SV-228537r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO407
Vuln IDs
  • V-228537
  • V-40864
Rule IDs
  • SV-228537r960963_rule
  • SV-53196
OneDrive (formerly SkyDrive) is a cloud based storage feature that introduces the capability for users to save documents to locations outside of protected enclaves. This feature introduces the risk that FOUO and PII data, as well as other DoD protected data, may be inadvertently stored in a nonsecure location. This setting, which will prompt the user to sign in to OneDrive while performing a file save operation, must be disabled.
Checks: C-30770r498889_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous .> "Show OneDrive Sign In" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value 'SkyDriveSignInOption' is REG_DWORD = 0, this is not a finding.

Fix: F-30755r498890_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Show OneDrive Sign In" to "Disabled".

b
Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.
CM-7 - Medium - CCI-000381 - V-228538 - SV-228538r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO408
Vuln IDs
  • V-228538
  • V-40875
Rule IDs
  • SV-228538r960963_rule
  • SV-53207
The Office Presentation Service is a free, public service that allows others to follow along in a web browser. Allowing this feature could result in presentations with DoD FOUO, PII and other protected data to be viewed in a nonsecure location. By disabling this policy, the user will not have the ability to deliver a presentation online.
Checks: C-30771r498892_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value 'disabledefaultservice' is REG_DWORD = 1, this is not a finding.

Fix: F-30756r498893_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" to "Enabled".

b
The Office Feedback tool must be disabled.
CM-7 - Medium - CCI-000381 - V-228539 - SV-228539r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO411
Vuln IDs
  • V-228539
  • V-40881
Rule IDs
  • SV-228539r960963_rule
  • SV-53213
The "Office Feedback" tool, also called "Send-a-Smile", allows a user to click on an icon and send feedback to Microsoft. Applications used by DoD users should not be able to provide feedback to commercial vendors regarding their positive and negative experiences when using Office due to the potential of unintentionally revealing FOUO or other protected content.
Checks: C-30772r498895_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value 'enabled' is REG_DWORD = 0, this is not a finding.

Fix: F-30757r498896_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" to "Disabled".

b
Roaming settings must be stored locally and not synchronized to the Microsoft Office roaming settings web service.
CM-7 - Medium - CCI-000381 - V-228540 - SV-228540r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO414
Vuln IDs
  • V-228540
  • V-40884
Rule IDs
  • SV-228540r960963_rule
  • SV-53216
Microsoft Office includes the ability to roam settings for specific Office features amongst devices by storing this data in the cloud. This data includes user activity such as the list of most recently used documents as well as user preferences such as the Office theme. This policy setting controls whether this data is allowed to be stored in the cloud. If this policy setting is enabled, roaming settings are only stored locally and not synchronized to the Microsoft Office roaming settings web service. If this policy setting is disabled or not configured, roaming settings are synchronized with the Microsoft Office roaming settings web service and users can access their data from other devices. Existing data in the cloud is not affected by this policy.
Checks: C-30773r498898_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\roaming If the value 'roamingsettingsdisabled' is REG_DWORD = 1, this is not a finding.

Fix: F-30758r498899_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" to "Enabled".

b
The ability of the Office Telemetry Agent to periodically upload telemetry data to a shared folder must be disabled.
CM-7 - Medium - CCI-000381 - V-228541 - SV-228541r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO415
Vuln IDs
  • V-228541
  • V-40885
Rule IDs
  • SV-228541r960963_rule
  • SV-53217
Office Telemetry is a new compatibility monitoring framework. When an Office document or solution is loaded, used, closed, or raises an error in certain Office 2013 applications, the Office Telemetry application adds a record about the event to a local data store. Each record includes a description of the problem and a link to more information. Inventory and usage data is also tracked. The actual logging capability will be enabled, but this policy allows that data to be uploaded to a remote location which, if enabled, could pass information about the internal network and configuration to that remote site.
Checks: C-30774r498901_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value 'enableupload' is REG_DWORD = 0, this is not a finding.

Fix: F-30759r498902_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" to "Disabled".

b
The Office Telemetry Agent and Office applications must be configured to collect telemetry data.
CM-7 - Medium - CCI-000381 - V-228542 - SV-228542r960963_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTOO417
Vuln IDs
  • V-228542
  • V-40887
Rule IDs
  • SV-228542r960963_rule
  • SV-53219
Office Telemetry is a new compatibility monitoring framework. When an Office document or solution is loaded, used, closed, or raises an error in certain Office 2013 applications, the Office Telemetry application adds a record about the event to a local data store. Each record includes a description of the problem and a link to more information. Inventory and usage data is also tracked. This policy setting allows the data collection features in Office that are used by the Office Telemetry Dashboard and Office Telemetry Log to be turned on. If this policy setting is enabled, Office Telemetry Agent and Office applications will collect telemetry data, which includes Office application usage, most recently used Office documents (including file names) and solutions usage, compatibility issues, and critical errors that occur on the local computers. Office Telemetry Dashboard can be used to view this data remotely, and users can use Office Telemetry Log to view this data on their local computers. If this policy setting is disabled or not configured, the Office Telemetry Agent and Office applications do not generate or collect telemetry data.
Checks: C-30775r498904_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value 'enablelogging' is REG_DWORD = 1, this is not a finding.

Fix: F-30760r498905_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" to "Enabled".

b
Documents must be configured to not open as Read Write when browsing.
SC-18 - Medium - CCI-001170 - V-228543 - SV-228543r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO179
Vuln IDs
  • V-228543
  • V-17759
Rule IDs
  • SV-228543r961092_rule
  • SV-52714
By default, when an Office 2013 document on a web server is opened using Internet Explorer, the appropriate application opens the file in read-only mode. However, if the default configuration is changed, the document is opened as read/write. Users could potentially make changes to documents and resave them in situations where the web server security is not configured to prevent such changes.
Checks: C-30776r498907_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value 'OpenDocumentsReadWriteWhileBrowsing' for REG_DWORD = 0, this is not a finding.

Fix: F-30761r498908_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" to "Disabled".

b
Relying on Vector markup Language (VML) for displaying graphics in browsers must be disallowed.
SC-18 - Medium - CCI-001170 - V-228544 - SV-228544r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO180
Vuln IDs
  • V-228544
  • V-17773
Rule IDs
  • SV-228544r961092_rule
  • SV-52715
When saving documents as web pages, Excel, PowerPoint, and Word can save vector-based graphics in Vector Markup Language (VML), which enables Internet Explorer to display them smoothly at any resolution. By default, when saving VML graphics, Office applications also save copies of the graphics in a standard raster file format (GIF or PNG) for use by browsers that cannot display VML. If the "Rely on VML for displaying graphics in browsers" check box in the web Options dialog box is selected, applications will not save raster copies of VML graphics, which means those graphics will not display in non-Microsoft browsers.
Checks: C-30777r498910_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Web Options >> Browsers "Rely on VML for displaying graphics in browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet. If the value 'RelyOnVML' is REG_DWORD = 0, this is not a finding.

Fix: F-30762r498911_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Rely on VML for displaying graphics in browsers" to "Disabled".

b
Automation Security to enforce macro level security in Office documents must be configured.
SC-18 - Medium - CCI-001170 - V-228545 - SV-228545r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO193
Vuln IDs
  • V-228545
  • V-17741
Rule IDs
  • SV-228545r961092_rule
  • SV-52730
When a separate program is used to launch Microsoft Office Excel, PowerPoint, or Word programmatically, any macros can run in the programmatically opened application without being blocked. This functionality could allow an attacker to use automation to run malicious code in Excel, PowerPoint, or Word.
Checks: C-30778r572126_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Security If the value "AutomationSecurity" is REG_DWORD =2, this is not a finding.

Fix: F-30763r498914_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Automation Security" to "Enabled (Use application macro security level)".

b
The ability to create an online presentation programmatically must be disabled.
SC-18 - Medium - CCI-001170 - V-228546 - SV-228546r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO409
Vuln IDs
  • V-228546
  • V-40879
Rule IDs
  • SV-228546r961092_rule
  • SV-53211
Allowing online presentations to be created programmatically allows for the capability of malicious content to become imbedded in those programmatically created presentations.
Checks: C-30779r498916_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Restrict programmatic access for creating online presentations in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value 'disableprogrammaticaccess' is REG_DWORD = 1, this is not a finding.

Fix: F-30764r498917_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" to "Enabled".

b
Document metadata for password protected files must be protected.
SC-28 - Medium - CCI-001199 - V-228547 - SV-228547r961128_rule
RMF Control
SC-28
Severity
Medium
CCI
CCI-001199
Version
DTOO188
Vuln IDs
  • V-228547
  • V-17768
Rule IDs
  • SV-228547r961128_rule
  • SV-52725
When an Office Open XML document is protected with a password and saved, any metadata associated with the document is encrypted along with the rest of the document's contents. If this configuration is changed, potentially sensitive information such as the document author and hyperlink references could be exposed to unauthorized people.
Checks: C-30780r498919_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for password protected files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'OpenXMLEncryptProperty' is REG_DWORD = 1, this is not a finding.

Fix: F-30765r498920_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for password protected files" to "Enabled".

b
The encryption type for password protected Open XML files must be set.
SC-28 - Medium - CCI-001199 - V-228548 - SV-228548r961128_rule
RMF Control
SC-28
Severity
Medium
CCI
CCI-001199
Version
DTOO189
Vuln IDs
  • V-228548
  • V-17619
Rule IDs
  • SV-228548r961128_rule
  • SV-52726
If unencrypted files are intercepted, sensitive information in the files can be compromised. To protect information confidentiality, Microsoft Office application files can be encrypted and password protected. Only users who know the correct password will be able to decrypt such files. Since some encryption types are less secure and easier to breach, Microsoft Enhanced RSA and AES Cryptographic Provider, AES-256, 256-bit should be used when encrypting documents.
Checks: C-30781r498922_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office Open XML files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'OpenXMLEncryption' is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256", this is not a finding.

Fix: F-30766r498969_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office Open XML files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".

b
The encryption type for password protected Office 97 thru Office 2003 must be set.
SC-28 - Medium - CCI-001199 - V-228549 - SV-228549r961128_rule
RMF Control
SC-28
Severity
Medium
CCI
CCI-001199
Version
DTOO190
Vuln IDs
  • V-228549
  • V-17617
Rule IDs
  • SV-228549r961128_rule
  • SV-52727
If unencrypted files are intercepted, sensitive information in the files can be compromised. To protect information confidentiality, Microsoft Office application files can be encrypted and password protected. Only users who know the correct password will be able to decrypt such files. Since some encryption types are less secure and easier to breach, Microsoft Enhanced RSA and AES Cryptographic Provider, AES-256, 256-bit should be used when encrypting documents.
Checks: C-30782r498925_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office 97-2003 files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'DefaultEncryption12' is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256", this is not a finding.

Fix: F-30767r498967_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".

b
Passwords for secured documents must be enforced.
SC-28 - Medium - CCI-001199 - V-228550 - SV-228550r961128_rule
RMF Control
SC-28
Severity
Medium
CCI
CCI-001199
Version
DTOO195
Vuln IDs
  • V-228550
  • V-17665
Rule IDs
  • SV-228550r961128_rule
  • SV-52744
If 2013 Office users add passwords to documents, other users can be prevented from opening the documents. This capability can provide an extra level of protection to documents already protected by access control lists, or provide a means of securing documents not protected by file-level security. By default, users can add passwords to Excel 2013 workbooks, PowerPoint 2013 presentations, and Word 2013 documents from the Save or Save As dialog box by clicking Tools, clicking General Options, and entering appropriate passwords to open or modify the documents. If this configuration is changed, the General Options dialog box for saving with a password will not be available for the user to password-protect their documents.
Checks: C-30783r498928_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'DisablePasswordUI' is REG_DWORD = 0, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" to "Disabled".

Fix: F-30768r498929_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable password to open UI" to "Disabled".

b
Trust Bar notifications for Security messages must be enforced.
SC-18 - Medium - CCI-001662 - V-228551 - SV-228551r961089_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001662
Version
DTOO186
Vuln IDs
  • V-228551
  • V-17590
Rule IDs
  • SV-228551r961089_rule
  • SV-52723
The Message Bar in Office applications is used to identify security issues, such as unsigned macros or potentially unsafe add-ins. When such issues are detected, the application disables the unsafe feature or content and displays the Message Bar at the top of the active window. The Message Bar informs the users about the nature of the security issue and, in some cases, provides the users with an option to enable the potentially unsafe feature or content, which could harm the user's computer. By default, if an Office application detects a security issue, the Message Bar is displayed. However, this configuration can be modified by users in the Trust Center.
Checks: C-30784r498931_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable all Trust Bar notifications for security issues" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\trustcenter If the value 'TrustBar' is REG_DWORD = 0, this is not a finding.

Fix: F-30769r498932_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".

b
Load controls in forms3 must be disabled from loading.
SC-18 - Medium - CCI-001662 - V-228552 - SV-228552r961089_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001662
Version
DTOO192
Vuln IDs
  • V-228552
  • V-17750
Rule IDs
  • SV-228552r961089_rule
  • SV-52729
ActiveX controls are Component Object Model (COM) objects and have unrestricted access to users' computers. ActiveX controls can access the local file system and change the registry settings of the operating system. If a malicious user repurposes an ActiveX control to take over a user's computer, the effect could be significant. To help improve security, ActiveX developers can mark controls as Safe For Initialization (SFI), which means that the developer states that the controls are safe to open and run and not capable of causing harm to any computers. If a control is not marked SFI, the control could adversely affect a computer--or it could mean the developers did not test the control in all situations and are not sure whether their control might be compromised at some future date. SFI controls run in safe mode, which limits their access to the computer. For example, a worksheet control can both read and write files when it is in unsafe mode, but perhaps only read from files when it is in safe mode. This functionality allows the control to be used in very powerful ways when safety is not important, but the control would still be safe for use in a Web page. If a control is not marked as SFI, it is marked Unsafe For Initialization (UFI), which means that it is capable of affecting a user's computer. If UFI ActiveX controls are loaded, they are always loaded in unsafe mode.
Checks: C-30785r498934_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Load Controls in Forms3" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\keycupoliciesmsvbasecurity If the value 'LoadControlsInForms' exists, this is a finding.

Fix: F-30770r498935_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Load Controls in Forms3" to "Disabled".

b
Users must be prevented from using or inserting apps that come from the Office Store.
CM-5 - Medium - CCI-001749 - V-228553 - SV-228553r960954_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
DTOO413
Vuln IDs
  • V-228553
  • V-40883
Rule IDs
  • SV-228553r960954_rule
  • SV-53215
This policy setting allows users to be prevented from using or inserting apps that come from the Office Store. If this policy setting is enabled, apps from the Office Store are blocked. If this policy setting is disabled or not configured, apps from the Office Store are allowed, unless the "Block Apps for Office" policy setting is enabled.
Checks: C-30786r498937_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value 'disableomexcatalogs' is REG_DWORD = 1, this is not a finding.

Fix: F-30771r498938_fix

Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" to "Enabled".

b
Changing permissions on rights managed content for users must be enforced.
AC-3 - Medium - CCI-002165 - V-228554 - SV-228554r961317_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
DTOO199
Vuln IDs
  • V-228554
  • V-17765
Rule IDs
  • SV-228554r961317_rule
  • SV-52748
This setting controls whether Office 2013 users can change permissions for content that is protected with Information Rights Management (IRM). The Information Rights Management feature of Office 2013 allows individuals and administrators to specify access permissions to Word documents, Excel workbooks, PowerPoint presentations, InfoPath templates and forms, and Outlook email messages. This functionality helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people.
Checks: C-30787r849862_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value 'DisableCreation' is REG_DWORD = 0, this is not a finding.

Fix: F-30772r498941_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" to "Disabled".

b
Office must be configured to not allow read with browsers.
AC-3 - Medium - CCI-002165 - V-228555 - SV-228555r961317_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
DTOO200
Vuln IDs
  • V-228555
  • V-17583
Rule IDs
  • SV-228555r961317_rule
  • SV-52749
The Windows Rights Management Add-on for Internet Explorer provides a way for users who do not use the 2013 Office release to view, but not alter, files with restricted permissions. By default, IRM-enabled files are saved in a format that cannot be viewed by using the Windows Rights Management Add-on. If this setting is enabled, an embedded rights-managed HTML version of the content is saved with each IRM-enabled file, which can be viewed in Internet Explorer using the add-on, representing the risk of documents being read by those without the rights and not intended to have access to the document.
Checks: C-30788r498943_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm If the value 'IncludeHTML' is REG_DWORD = 0, this is not a finding.

Fix: F-30773r498944_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" to "Disabled".

b
Connection verification of permissions must be enforced.
AC-6 - Medium - CCI-002235 - V-228556 - SV-228556r961353_rule
RMF Control
AC-6
Severity
Medium
CCI
CCI-002235
Version
DTOO201
Vuln IDs
  • V-228556
  • V-17731
Rule IDs
  • SV-228556r961353_rule
  • SV-52750
Users are not required to connect to the network to verify permissions. If users do not need their licenses confirmed when attempting to open Office documents, they might be able to access documents after their licenses have been revoked. Also, it is not possible to log the usage of files with restricted permissions if users' licenses are not confirmed.
Checks: C-30789r498946_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Always require users to connect to verify permission" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value 'RequireConnection' is REG_DWORD = 1, this is not a finding.

Fix: F-30774r498947_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Always require users to connect to verify permission" to "Enabled".

b
ActiveX control initialization must be disabled.
SC-18 - Medium - CCI-002460 - V-228557 - SV-228557r961779_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-002460
Version
DTOO191
Vuln IDs
  • V-228557
  • V-17547
Rule IDs
  • SV-228557r961779_rule
  • SV-52728
ActiveX controls can adversely affect a computer directly. In addition, malicious code can be used to compromise an ActiveX control and attack a computer. To indicate the safety of an ActiveX control, developers can denote them as Safe For Initialization (SFI). SFI indicates a control is safe to open and run, and it is not capable of causing a problem for any computer, regardless of whether it has persisted data values or not. If a control is not marked SFI, it is possible the control could adversely affect a computer—or it could mean the developers did not test the control in all situations and are not sure whether it might be compromised in the future. By default, if a control is marked SFI, the application loads the control in safe mode and uses persisted values (if any). If the control is not marked SFI, the application loads the control in unsafe mode with persisted values (if any), or uses the default (first-time initialization) settings. In both situations, the Message Bar informs users the controls have been disabled and prompts them to respond.
Checks: C-30790r498949_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "ActiveX Control Initialization" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Security If the value 'UFIControls' exists, this is a finding.

Fix: F-30775r498950_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "ActiveX Control Initialization" to "Disabled".

b
Hyperlink warnings for Office must be configured for use.
SC-18 - Medium - CCI-002460 - V-228558 - SV-228558r961779_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-002460
Version
DTOO194
Vuln IDs
  • V-228558
  • V-17659
Rule IDs
  • SV-228558r961779_rule
  • SV-52731
Unsafe hyperlinks are links that might pose a security risk if users click them. Clicking an unsafe link could compromise the security of sensitive information or harm the computer. Links that Office considers unsafe include links to executable files, TIFF files, and Microsoft Document Imaging (MDI) files. Other unsafe links are those using protocols considered to be unsafe, including msn, nntp, mms, outlook, and stssync.
Checks: C-30791r498952_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Suppress hyperlink warnings" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value 'DisableHyperLinkWarning' is REG_DWORD = 0, this is not a finding.

Fix: F-30776r498953_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Suppress hyperlink warnings" to "Disabled".

b
Document Information panel Beaconing must show UI.
SC-18 - Medium - CCI-002460 - V-228559 - SV-228559r961779_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-002460
Version
DTOO207
Vuln IDs
  • V-228559
  • V-17605
Rule IDs
  • SV-228559r961779_rule
  • SV-52754
This policy setting controls whether users see a security warning when they open custom Document Information Panels that contain a web beaconing threat. Web beacons can be used to contact an external server when users open forms. Information could be gathered by the form, or information entered by users could be sent to an external server, exposing the internal users and systems to additional attacks.
Checks: C-30792r498955_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Document Information Panel "Document Information Panel Beaconing UI" is set to "Enabled (Always show UI)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\documentinformationpanel If the value 'Beaconing' is REG_DWORD = 1, this is not a finding.

Fix: F-30777r498956_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Document Information Panel "Document Information Panel Beaconing UI" to "Enabled (Always show UI)".

b
Rights managed Office Open XML files must be protected.
SC-28 - Medium - CCI-002476 - V-228560 - SV-228560r961602_rule
RMF Control
SC-28
Severity
Medium
CCI
CCI-002476
Version
DTOO187
Vuln IDs
  • V-228560
  • V-17769
Rule IDs
  • SV-228560r961602_rule
  • SV-52724
When Information Rights Management (IRM) is used to restrict access to an Office Open XML document, any metadata associated with the document is not encrypted. This configuration could allow potentially sensitive information such as the document author and hyperlink references to be exposed to unauthorized individuals.
Checks: C-30793r498958_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value 'DRMEncryptProperty' is REG_DWORD = 1, this is not a finding.

Fix: F-30778r498959_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".

b
Encrypt document properties must be configured for OLE documents.
SC-28 - Medium - CCI-002476 - V-228561 - SV-228561r961602_rule
RMF Control
SC-28
Severity
Medium
CCI
CCI-002476
Version
DTOO321
Vuln IDs
  • V-228561
  • V-26704
Rule IDs
  • SV-228561r961602_rule
  • SV-52757
This policy setting allows a document's properties to be encrypted. This applies to OLE documents (Office 97-2003 compatible) if the application is configured for CAPI RC4. Disabling this setting will prevent the encryption of document properties, which may expose sensitive data.
Checks: C-30794r498961_chk

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encrypt document properties" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value 'EncryptDocProps' is REG_DWORD = 1, this is not a finding.

Fix: F-30779r498962_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encrypt document properties" to "Enabled".

b
The version of Microsoft Office running on the system must be a supported version.
SI-2 - Medium - CCI-002605 - V-228562 - SV-228562r1000185_rule
RMF Control
SI-2
Severity
Medium
CCI
CCI-002605
Version
DTOO401
Vuln IDs
  • V-228562
  • V-40858
Rule IDs
  • SV-228562r1000185_rule
  • SV-53190
Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously. Organization-defined time periods for updating security-relevant software may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). This requirement will apply to software patch management solutions used to install patches across the enclave and also to applications themselves that are not part of that patch management solution. For example, many browsers today provide the capability to install their own patch software. Patch criticality, as well as system criticality will vary. Therefore, the tactical situations regarding the patch management process will also vary. This means that the time period used must be a configurable parameter. Time frames for application of security-relevant software updates may be dependent upon the Information Assurance Vulnerability Management (IAVM) process. The application will be configured to check for and install security-relevant software updates within an identified time period from the availability of the update. The specific time period will be defined by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
Checks: C-30795r1000183_chk

Microsoft Office 2013 is no longer supported by the vendor. If the system is running Microsoft Office 2013, this is a finding.

Fix: F-30780r1000184_fix

Upgrade to a supported version.