Microsoft Office System 2013 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 4
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 4
- V-17617 Medium checkfix The encryption type for password protected Office 97 thru Office 2003 must be set.
- V-17619 Medium checkfix The encryption type for password protected Open XML files must be set.
- V-17664 Medium check The Opt-In Wizard must be disabled.
- V-40864 Medium descriptioncheckfix The prompt to save to OneDrive (formerly SkyDrive) must be disabled.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO191
- Vuln IDs
-
- V-17547
- Rule IDs
-
- SV-52728r1_rule
Checks: C-47056r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "ActiveX Control Initialization" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value UFIControls exists, this is a finding.
Fix: F-45653r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "ActiveX Control Initialization" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO196
- Vuln IDs
-
- V-17560
- Rule IDs
-
- SV-52745r1_rule
Checks: C-47074r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center "Allow mix of policy and user locations" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security\trusted locations Criteria: If the value Allow User Locations is REG_DWORD = 0, this is not a finding.
Fix: F-45671r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center "Allow mix of policy and user locations" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO181
- Vuln IDs
-
- V-17561
- Rule IDs
-
- SV-52718r1_rule
Checks: C-47046r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Allow PNG as an output format" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\internet Criteria: If the value AllowPNG is REG_DWORD = 0, this is not a finding.
Fix: F-45643r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Allow PNG as an output format" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO212
- Vuln IDs
-
- V-17581
- Rule IDs
-
- SV-52756r1_rule
Checks: C-47085r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous "Control Blogging" is set to "Enabled (Only SharePoint blogs allowed)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Blog Criteria: If the value DisableBlog is REG_DWORD = 1, this is not a finding.
Fix: F-45682r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous "Control Blogging" to "Enabled (Only SharePoint blogs allowed)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO200
- Vuln IDs
-
- V-17583
- Rule IDs
-
- SV-52749r1_rule
Checks: C-47078r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value IncludeHTML is REG_DWORD = 0, this is not a finding.
Fix: F-45675r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO186
- Vuln IDs
-
- V-17590
- Rule IDs
-
- SV-52723r1_rule
Checks: C-47051r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable all Trust Bar notifications for security issues" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\trustcenter Criteria: If the value TrustBar is REG_DWORD = 0, this is not a finding.
Fix: F-45648r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO207
- Vuln IDs
-
- V-17605
- Rule IDs
-
- SV-52754r1_rule
Checks: C-47083r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Document Information Panel "Document Information Panel Beaconing UI" is set to "Enabled (Always show UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\documentinformationpanel Criteria: If the value Beaconing is REG_DWORD = 1, this is not a finding.
Fix: F-45680r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Document Information Panel "Document Information Panel Beaconing UI" to "Enabled (Always show UI)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO184
- Vuln IDs
-
- V-17612
- Rule IDs
-
- SV-52721r1_rule
Checks: C-47049r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Enable Customer Experience Improvement Program" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common Criteria: If the value QMEnable is REG_DWORD =0, this is not a finding.
Fix: F-45646r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Enable Customer Experience Improvement Program" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO190
- Vuln IDs
-
- V-17617
- Rule IDs
-
- SV-52727r2_rule
Checks: C-47055r2_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office 97-2003 files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value DefaultEncryption12 is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-45652r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO189
- Vuln IDs
-
- V-17619
- Rule IDs
-
- SV-52726r2_rule
Checks: C-47054r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office Open XML files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-45651r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office Open XML files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO182
- Vuln IDs
-
- V-17627
- Rule IDs
-
- SV-52719r1_rule
Checks: C-47047r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\ptwatson Criteria: If the value PTWOptIn is REG_DWORD = 0, this is not a finding.
Fix: F-45644r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO194
- Vuln IDs
-
- V-17659
- Rule IDs
-
- SV-52731r1_rule
Checks: C-47059r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Suppress hyperlink warnings" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value DisableHyperLinkWarning is REG_DWORD = 0, this is not a finding.
Fix: F-45656r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Suppress hyperlink warnings" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO206
- Vuln IDs
-
- V-17660
- Rule IDs
-
- SV-52753r1_rule
Checks: C-47082r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\fixedformat Criteria: If the value DisableFixedFormatDocProperties is REG_DWORD = 1, this is not a finding.
Fix: F-45679r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO198
- Vuln IDs
-
- V-17661
- Rule IDs
-
- SV-52747r1_rule
Checks: C-47076r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> Fax "Disable Internet Fax feature" to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\services\fax Criteria: If the value NoFax is REG_DWORD = 1, this is not a finding.
Fix: F-45673r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> Fax "Disable Internet Fax feature" to "Enabled"
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO183
- Vuln IDs
-
- V-17664
- Rule IDs
-
- SV-52720r2_rule
Checks: C-47048r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Disable Opt-in Wizard on first run" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\general Criteria: If the value ShownFirstRunOptin is REG_DWORD = 1, this is not a finding.
Fix: F-45645r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Disable Opt-in Wizard on first run" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO195
- Vuln IDs
-
- V-17665
- Rule IDs
-
- SV-52744r1_rule
Checks: C-47073r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable password to open UI" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value DisablePasswordUI is REG_DWORD = 0, this is not a finding.
Fix: F-45670r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable password to open UI" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO197
- Vuln IDs
-
- V-17669
- Rule IDs
-
- SV-52746r1_rule
Checks: C-47075r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag Criteria: If the value NeverLoadManifests is REG_DWORD = 1, this is not a finding.
Fix: F-45672r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO208
- Vuln IDs
-
- V-17670
- Rule IDs
-
- SV-52755r1_rule
Checks: C-47084r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Server Settings "Disable the Office client from polling the SharePoint Server for published links" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\portal Criteria: If the value LinkPublishingDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-45681r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Server Settings "Disable the Office client from polling the SharePoint Server for published links" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO201
- Vuln IDs
-
- V-17731
- Rule IDs
-
- SV-52750r1_rule
Checks: C-47079r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Always require users to connect to verify permission" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value RequireConnection is REG_DWORD = 1, this is not a finding.
Fix: F-45676r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Always require users to connect to verify permission" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO185
- Vuln IDs
-
- V-17740
- Rule IDs
-
- SV-52722r1_rule
Checks: C-47050r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Automatically receive small updates to improve reliability" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common Criteria: If the value UpdateReliabilityData is REG_DWORD = 0, this is not a finding.
Fix: F-45647r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Automatically receive small updates to improve reliability" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO193
- Vuln IDs
-
- V-17741
- Rule IDs
-
- SV-52730r1_rule
Checks: C-47058r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix: F-45655r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO203
- Vuln IDs
-
- V-17749
- Rule IDs
-
- SV-52751r1_rule
Checks: C-47080r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Legacy format signatures" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures Criteria: If the value EnableCreationOfWeakXPSignatures is REG_DWORD = 1, this is not a finding.
Fix: F-45677r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Legacy format signatures" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO192
- Vuln IDs
-
- V-17750
- Rule IDs
-
- SV-52729r1_rule
Checks: C-47057r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Load Controls in Forms3" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\keycupoliciesmsvbasecurity Criteria: If the value LoadControlsInForms exists, this is a finding.
Fix: F-45654r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Load Controls in Forms3" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO179
- Vuln IDs
-
- V-17759
- Rule IDs
-
- SV-52714r1_rule
Checks: C-47042r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options... -> Files "Open Office documents as read/write while browsing" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\internet Criteria: If the value OpenDocumentsReadWriteWhileBrowsing is REG_DWORD = 0, this is not a finding.
Fix: F-45638r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options... -> Files "Open Office documents as read/write while browsing" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO199
- Vuln IDs
-
- V-17765
- Rule IDs
-
- SV-52748r1_rule
Checks: C-47077r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value DisableCreation is REG_DWORD = 0, this is not a finding.
Fix: F-45674r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO188
- Vuln IDs
-
- V-17768
- Rule IDs
-
- SV-52725r1_rule
Checks: C-47053r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for password protected files" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value OpenXMLEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-45650r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for password protected files" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO187
- Vuln IDs
-
- V-17769
- Rule IDs
-
- SV-52724r1_rule
Checks: C-47052r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-45649r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO180
- Vuln IDs
-
- V-17773
- Rule IDs
-
- SV-52715r1_rule
Checks: C-47043r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Rely on VML for displaying graphics in browsers" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\internet Criteria: If the value RelyOnVML is REG_DWORD = 0, this is not a finding.
Fix: F-45640r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Rely on VML for displaying graphics in browsers" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO204
- Vuln IDs
-
- V-17805
- Rule IDs
-
- SV-52752r1_rule
Checks: C-47081r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Suppress external signature services menu item" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures Criteria: If the value SuppressExtSigningSvcs is REG_DWORD = 1, this is not a finding.
Fix: F-45678r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Suppress external signature services menu item" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO345
- Vuln IDs
-
- V-26630
- Rule IDs
-
- SV-52758r1_rule
Checks: C-47087r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools | Options | General | Service Options... -> Online Content "Online content options" is set to "Enabled: Do not allow Office to connect to the internet". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\internet Criteria: If the value UseOnlineContent is REG_DWORD = 0, this is not a finding.
Fix: F-45684r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools | Options | General | Service Options... -> Online Content "Online content options" to "Enabled: Do not allow Office to connect to the internet".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO321
- Vuln IDs
-
- V-26704
- Rule IDs
-
- SV-52757r1_rule
Checks: C-47086r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encrypt document properties" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value EncryptDocProps is REG_DWORD = 1, this is not a finding.
Fix: F-45683r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encrypt document properties" to "Enabled".
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-001238
- Version
- DTOO401
- Vuln IDs
-
- V-40858
- Rule IDs
-
- SV-53190r1_rule
Checks: C-47496r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" is set to "Enabled". Verify the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" is set to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:" both point to an Intranet system. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value EnableAutomaticUpdates is REG_DWORD = 1, this is not a finding. If the registry key is missing, this is an Open finding. This setting is, by default, enabled and must be explicitly configured to be disabled. HKLM\software\policies\Microsoft\Windows\WindowsUpdate Criteria: If the value of WUServer and WUStatusServer are populated with an Intranet system, this is not a finding.
Fix: F-46116r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" to "Enabled". Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:"to point to an Intranet system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO402
- Vuln IDs
-
- V-40859
- Rule IDs
-
- SV-53191r1_rule
Checks: C-47497r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value HideEnableDisableUpdates is REG_DWORD = 1, this is not a finding.
Fix: F-46117r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO403
- Vuln IDs
-
- V-40860
- Rule IDs
-
- SV-53192r1_rule
Checks: C-47498r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable First Run Movie" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\firstrun Criteria: If the value disablemovie is REG_DWORD = 1, this is not a finding.
Fix: F-46118r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable First Run Movie" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO404
- Vuln IDs
-
- V-40861
- Rule IDs
-
- SV-53193r1_rule
Checks: C-47499r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable Office First Run on application boot" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\firstrun Criteria: If the value bootedrtm is REG_DWORD = 1, this is not a finding.
Fix: F-46119r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable Office First Run on application boot" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO405
- Vuln IDs
-
- V-40862
- Rule IDs
-
- SV-53194r1_rule
Checks: C-47500r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Block signing into Office" is set to "Enabled: org ID only". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\signin Criteria: If the value signinoptions is REG_DWORD = 2, this is not a finding.
Fix: F-46120r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Block signing into Office" to "Enabled: org ID only".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO406
- Vuln IDs
-
- V-40863
- Rule IDs
-
- SV-53195r1_rule
Checks: C-47501r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Do not automatically hyperlink screenshots" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\gfx Criteria: If the value disablescreenshotautohyperlink is REG_DWORD = 1, this is not a finding.
Fix: F-46121r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Do not automatically hyperlink screenshots" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO407
- Vuln IDs
-
- V-40864
- Rule IDs
-
- SV-53196r3_rule
Checks: C-47502r6_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Show OneDrive Sign In" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\Policies\Microsoft\office\15.0\common\general Criteria: If the value SkyDriveSignInOption is REG_DWORD = 0, this is not a finding.
Fix: F-46122r4_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Show OneDrive Sign In" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO408
- Vuln IDs
-
- V-40875
- Rule IDs
-
- SV-53207r1_rule
Checks: C-47513r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\broadcast Criteria: If the value disabledefaultservice is REG_DWORD = 1, this is not a finding.
Fix: F-46133r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO409
- Vuln IDs
-
- V-40879
- Rule IDs
-
- SV-53211r1_rule
Checks: C-47517r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\broadcast Criteria: If the value disableprogrammaticaccess is REG_DWORD = 1, this is not a finding.
Fix: F-46137r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO410
- Vuln IDs
-
- V-40880
- Rule IDs
-
- SV-53212r1_rule
Checks: C-47518r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center ->"Allow including screenshot with Office Feedback" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\feedback Criteria: If the value includescreenshot is REG_DWORD = 0, this is not a finding.
Fix: F-46138r3_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center -> "Allow including screenshot with Office Feedback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO411
- Vuln IDs
-
- V-40881
- Rule IDs
-
- SV-53213r1_rule
Checks: C-47519r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center -> "Send Office Feedback" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\feedback Criteria: If the value enabled is REG_DWORD = 0, this is not a finding.
Fix: F-46139r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center -> "Send Office Feedback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO412
- Vuln IDs
-
- V-40882
- Rule IDs
-
- SV-53214r1_rule
Checks: C-47521r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center -> Trusted Catalogs "Allow Unsecure Apps and Catalogs" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\wef\trustedcatalogs Criteria: If the value requireserververification is REG_DWORD = 1, this is not a finding.
Fix: F-46141r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center -> Trusted Catalogs "Allow Unsecure Apps and Catalogs" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO413
- Vuln IDs
-
- V-40883
- Rule IDs
-
- SV-53215r1_rule
Checks: C-47522r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center -> Trusted Catalogs "Block the Office Store" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\wef\trustedcatalogs Criteria: If the value disableomexcatalogs is REG_DWORD = 1, this is not a finding.
Fix: F-46142r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center -> Trusted Catalogs "Block the Office Store" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO414
- Vuln IDs
-
- V-40884
- Rule IDs
-
- SV-53216r1_rule
Checks: C-47523r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> "Disable Roaming Office User Settings" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\roaming Criteria: If the value roamingsettingsdisabled is REG_DWORD = 1, this is not a finding.
Fix: F-46143r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> "Disable Roaming Office User Settings" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO415
- Vuln IDs
-
- V-40885
- Rule IDs
-
- SV-53217r1_rule
Checks: C-47524r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Telemetry Dashboard -> "Turn on data uploading for Office Telemetry Agent" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\osm Criteria: If the value enableupload is REG_DWORD = 0, this is not a finding.
Fix: F-46144r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Telemetry Dashboard -> "Turn on data uploading for Office Telemetry Agent" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO416
- Vuln IDs
-
- V-40886
- Rule IDs
-
- SV-53218r1_rule
Checks: C-47525r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Telemetry Dashboard -> "Turn on privacy setting in Office Telemetry Agent" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\osm Criteria: If the value enablefileobfuscation is REG_DWORD = 1, this is not a finding.
Fix: F-46145r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Telemetry Dashboard -> "Turn on privacy setting in Office Telemetry Agent" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO417
- Vuln IDs
-
- V-40887
- Rule IDs
-
- SV-53219r1_rule
Checks: C-47526r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Telemetry Dashboard -> "Turn on telemetry data collection" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\osm Criteria: If the value enablelogging is REG_DWORD = 1, this is not a finding.
Fix: F-46146r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Telemetry Dashboard -> "Turn on telemetry data collection" to "Enabled".