Microsoft Office System 2013 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 43
Comparison against the immediately-prior release (V1R7). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 43
- V-17560 Medium check A mix of policy and user locations for Office Products must be disallowed.
- V-17581 Medium check Blogging entries created from inside Office products must be configured for SharePoint only.
- V-17583 Medium check Office must be configured to not allow read with browsers.
- V-17590 Medium check Trust Bar notifications for Security messages must be enforced.
- V-17605 Medium check Document Information panel Beaconing must show UI.
- V-17612 Medium check The Customer Experience Improvement Program for Office must be disabled.
- V-17617 Medium check The encryption type for password protected Office 97 thru Office 2003 must be set.
- V-17619 Medium check The encryption type for password protected Open XML files must be set.
- V-17627 Medium check The Help Improve Proofing Tools feature for Office must be configured.
- V-17659 Medium check Hyperlink warnings for Office must be configured for use.
- V-17660 Medium check Inclusion of document properties for PDF and XPS output must be disallowed.
- V-17661 Medium check The Internet Fax Feature must be disabled.
- V-17664 Medium check The Opt-In Wizard must be disabled.
- V-17669 Medium check Smart Documents use of Manifests in Office must be disallowed.
- V-17670 Medium check Office client polling of SharePoint servers published links must be disabled.
- V-17731 Medium check Connection verification of permissions must be enforced.
- V-17740 Medium check Automatic receiving of small updates to improve reliability must be disallowed.
- V-17741 Medium check Automation Security to enforce macro level security in Office documents must be configured.
- V-17749 Medium check Legacy format signatures must be enabled.
- V-17750 Medium check Load controls in forms3 must be disabled from loading.
- V-17759 Medium check Documents must be configured to not open as Read Write when browsing.
- V-17765 Medium check Changing permissions on rights managed content for users must be enforced.
- V-17768 Medium check Document metadata for password protected files must be protected.
- V-17769 Medium check Rights managed Office Open XML files must be protected.
- V-17773 Medium check Relying on Vector markup Language (VML) for displaying graphics in browsers must be disallowed.
- V-17805 Medium check External Signature Services Menu for Office must be suppressed.
- V-26630 Medium check Online content options must be configured for offline content availability.
- V-26704 Medium check Encrypt document properties must be configured for OLE documents.
- V-40860 Medium check The video informing a user about signing into Office365 must be disabled.
- V-40861 Medium check The first-run prompt to sign into Office365 must be disabled.
- V-40862 Medium check The ability to sign into Office365 must be disabled.
- V-40863 Medium check The ability to automatically hyperlink screenshots within Word, PowerPoint, Excel and Outlook must be disabled.
- V-40864 Medium check The prompt to save to OneDrive (formerly SkyDrive) must be disabled.
- V-40875 Medium check Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.
- V-40879 Medium check The ability to create an online presentation programmatically must be disabled.
- V-40880 Medium check When using the Office Feedback tool, the ability to include a screenshot must be disabled.
- V-40881 Medium check The Office Feedback tool must be disabled.
- V-40882 Medium check The ability to run unsecure Office apps must be disabled.
- V-40883 Medium check Users must be prevented from using or inserting apps that come from the Office Store.
- V-40884 Medium check Roaming settings must be stored locally and not synchronized to the Microsoft Office roaming settings web service.
- V-40885 Medium check The ability of the Office Telemetry Agent to periodically upload telemetry data to a shared folder must be disabled.
- V-40886 Medium check The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
- V-40887 Medium check The Office Telemetry Agent and Office applications must be configured to collect telemetry data.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO191
- Vuln IDs
-
- V-17547
- Rule IDs
-
- SV-52728r2_rule
Checks: C-47056r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "ActiveX Control Initialization" is set to "Disabled". Use the Windows Registry Editor to navigate to the following hive: HKEY_Users For every users profile hive under HKEY_Users, navigate to the following key: \Software\Policies\Microsoft\Office\Common\Security If the value “UFIControls” exists for any user profile hive, this is a finding.
Fix: F-45653r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "ActiveX Control Initialization" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO196
- Vuln IDs
-
- V-17560
- Rule IDs
-
- SV-52745r3_rule
Checks: C-47074r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center "Allow mix of policy and user locations" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security\trusted locations If the value “Allow User Locations” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-45671r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center "Allow mix of policy and user locations" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO212
- Vuln IDs
-
- V-17581
- Rule IDs
-
- SV-52756r3_rule
Checks: C-47085r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous "Control Blogging" is set to "Enabled (Only SharePoint blogs allowed)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Blog If the value “DisableBlog” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45682r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous "Control Blogging" to "Enabled (Only SharePoint blogs allowed)".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- DTOO200
- Vuln IDs
-
- V-17583
- Rule IDs
-
- SV-52749r3_rule
Checks: C-47078r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm If the value “IncludeHTML” is REG_DWORD = 0, this is not a finding.
Fix: F-45675r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO186
- Vuln IDs
-
- V-17590
- Rule IDs
-
- SV-52723r3_rule
Checks: C-47051r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable all Trust Bar notifications for security issues" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\trustcenter If the value “TrustBar” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-45648r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO207
- Vuln IDs
-
- V-17605
- Rule IDs
-
- SV-52754r3_rule
Checks: C-47083r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Document Information Panel "Document Information Panel Beaconing UI" is set to "Enabled (Always show UI)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\documentinformationpanel If the value “Beaconing” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45680r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Document Information Panel "Document Information Panel Beaconing UI" to "Enabled (Always show UI)".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO184
- Vuln IDs
-
- V-17612
- Rule IDs
-
- SV-52721r3_rule
Checks: C-47049r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Enable Customer Experience Improvement Program" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common Criteria: If the value “QMEnable” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-45646r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Enable Customer Experience Improvement Program" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO190
- Vuln IDs
-
- V-17617
- Rule IDs
-
- SV-52727r4_rule
Checks: C-47055r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office 97-2003 files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “DefaultEncryption12” is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256" for every user profile hive, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)".
Fix: F-45652r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO189
- Vuln IDs
-
- V-17619
- Rule IDs
-
- SV-52726r4_rule
Checks: C-47054r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office Open XML files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “OpenXMLEncryption” is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256" for every user profile hive, this is not a finding.
Fix: F-45651r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office Open XML files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO182
- Vuln IDs
-
- V-17627
- Rule IDs
-
- SV-52719r4_rule
Checks: C-47047r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> Spelling >> Proofing Data Collection "Improve Proofing Tools" is set to "Disabled". Use the Windows Registry Editor to navigate to the following. HKCU\Software\Policies\Microsoft\Office\15.0\common\ptwatson If the value “PTWOptIn” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-45644r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO194
- Vuln IDs
-
- V-17659
- Rule IDs
-
- SV-52731r3_rule
Checks: C-47059r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Suppress hyperlink warnings" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value “DisableHyperLinkWarning” is REG_DWORD = 0 for all user profile hives, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Suppress hyperlink warnings" to "Disabled".
Fix: F-45656r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Suppress hyperlink warnings" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO206
- Vuln IDs
-
- V-17660
- Rule IDs
-
- SV-52753r3_rule
Checks: C-47082r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\fixedformat If the value “DisableFixedFormatDocProperties” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45679r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO198
- Vuln IDs
-
- V-17661
- Rule IDs
-
- SV-52747r3_rule
Checks: C-47076r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> Fax "Disable Internet Fax feature" to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\services\fax If the value “NoFax” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45673r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> Fax "Disable Internet Fax feature" to "Enabled"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO183
- Vuln IDs
-
- V-17664
- Rule IDs
-
- SV-52720r4_rule
Checks: C-47048r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Disable Opt-in Wizard on first run" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value “ShownFirstRunOptin” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45645r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Disable Opt-in Wizard on first run" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO195
- Vuln IDs
-
- V-17665
- Rule IDs
-
- SV-52744r2_rule
Checks: C-47073r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “DisablePasswordUI” is REG_DWORD = 0, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" to "Disabled".
Fix: F-45670r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable password to open UI" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO197
- Vuln IDs
-
- V-17669
- Rule IDs
-
- SV-52746r3_rule
Checks: C-47075r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag If the value “NeverLoadManifests” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45672r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" to "Enabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- DTOO208
- Vuln IDs
-
- V-17670
- Rule IDs
-
- SV-52755r3_rule
Checks: C-47084r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Server Settings "Disable the Office client from polling the SharePoint Server for published links" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\portal If the value “LinkPublishingDisabled” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45681r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Server Settings "Disable the Office client from polling the SharePoint Server for published links" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- DTOO201
- Vuln IDs
-
- V-17731
- Rule IDs
-
- SV-52750r3_rule
Checks: C-47079r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Always require users to connect to verify permission" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value “RequireConnection” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45676r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Always require users to connect to verify permission" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO185
- Vuln IDs
-
- V-17740
- Rule IDs
-
- SV-52722r3_rule
Checks: C-47050r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Automatically receive small updates to improve reliability" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common If the value “UpdateReliabilityData” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-45647r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Automatically receive small updates to improve reliability" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO193
- Vuln IDs
-
- V-17741
- Rule IDs
-
- SV-52730r3_rule
Checks: C-47058r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Security If the value “AutomationSecurity” is REG_DWORD = 2 for all user profile hives, this is not a finding.
Fix: F-45655r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO203
- Vuln IDs
-
- V-17749
- Rule IDs
-
- SV-52751r3_rule
Checks: C-47080r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures If the value “EnableCreationOfWeakXPSignatures” is REG_DWORD = 1 for every user profile hive, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" to "Enabled".
Fix: F-45677r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Legacy format signatures" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO192
- Vuln IDs
-
- V-17750
- Rule IDs
-
- SV-52729r3_rule
Checks: C-47057r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Load Controls in Forms3" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\keycupoliciesmsvbasecurity If the value “LoadControlsInForms” exists, this is a finding.
Fix: F-45654r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Load Controls in Forms3" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO179
- Vuln IDs
-
- V-17759
- Rule IDs
-
- SV-52714r5_rule
Checks: C-47042r9_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value “OpenDocumentsReadWriteWhileBrowsing” for every user profile hive is REG_DWORD = 0, this is not a finding.
Fix: F-45638r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" to "Disabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- DTOO199
- Vuln IDs
-
- V-17765
- Rule IDs
-
- SV-52748r3_rule
Checks: C-47077r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value “DisableCreation” is REG_DWORD = 0 for every users profile hive, this is not a finding.
Fix: F-45674r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO188
- Vuln IDs
-
- V-17768
- Rule IDs
-
- SV-52725r3_rule
Checks: C-47053r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for password protected files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “OpenXMLEncryptProperty” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45650r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for password protected files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO187
- Vuln IDs
-
- V-17769
- Rule IDs
-
- SV-52724r3_rule
Checks: C-47052r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “DRMEncryptProperty” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45649r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO180
- Vuln IDs
-
- V-17773
- Rule IDs
-
- SV-52715r3_rule
Checks: C-47043r7_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Web Options >> Browsers "Rely on VML for displaying graphics in browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet. If the value “RelyOnVML” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-45640r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Rely on VML for displaying graphics in browsers" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO204
- Vuln IDs
-
- V-17805
- Rule IDs
-
- SV-52752r3_rule
Checks: C-47081r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Suppress external signature services menu item" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures Criteria: If the value “SuppressExtSigningSvcs” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45678r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Suppress external signature services menu item" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO345
- Vuln IDs
-
- V-26630
- Rule IDs
-
- SV-52758r4_rule
Checks: C-47087r5_chk
Note: This check is Not Applicable when the use of Office 365 is against the specific DoD instance of O365. The use of Offline Content for Non-DoD instances of O365 is prohibited and it must not allow for personal account synchronization. All non-DoD instances are subject to this requirement. Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" is set to "Enabled: Do not allow Office to connect to the internet". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value “UseOnlineContent” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-45684r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" to "Enabled: Do not allow Office to connect to the internet".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO321
- Vuln IDs
-
- V-26704
- Rule IDs
-
- SV-52757r3_rule
Checks: C-47086r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encrypt document properties" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value “EncryptDocProps” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-45683r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encrypt document properties" to "Enabled".
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- DTOO401
- Vuln IDs
-
- V-40858
- Rule IDs
-
- SV-53190r1_rule
Checks: C-47496r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" is set to "Enabled". Verify the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" is set to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:" both point to an Intranet system. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value EnableAutomaticUpdates is REG_DWORD = 1, this is not a finding. If the registry key is missing, this is an Open finding. This setting is, by default, enabled and must be explicitly configured to be disabled. HKLM\software\policies\Microsoft\Windows\WindowsUpdate Criteria: If the value of WUServer and WUStatusServer are populated with an Intranet system, this is not a finding.
Fix: F-46116r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" to "Enabled". Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:"to point to an Intranet system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO402
- Vuln IDs
-
- V-40859
- Rule IDs
-
- SV-53191r1_rule
Checks: C-47497r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value HideEnableDisableUpdates is REG_DWORD = 1, this is not a finding.
Fix: F-46117r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO403
- Vuln IDs
-
- V-40860
- Rule IDs
-
- SV-53192r3_rule
Checks: C-47498r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable First Run Movie" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value “disablemovie” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-46118r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable First Run Movie" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO404
- Vuln IDs
-
- V-40861
- Rule IDs
-
- SV-53193r3_rule
Checks: C-47499r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable Office First Run on application boot" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value “bootedrtm” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-46119r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable Office First Run on application boot" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO405
- Vuln IDs
-
- V-40862
- Rule IDs
-
- SV-53194r3_rule
Checks: C-47500r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Block signing into Office" is set to "Enabled: org ID only". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signin If the value “signinoptions” is REG_DWORD = 2 for every user profile hive, this is not a finding.
Fix: F-46120r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Block signing into Office" to "Enabled: org ID only".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO406
- Vuln IDs
-
- V-40863
- Rule IDs
-
- SV-53195r3_rule
Checks: C-47501r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Do not automatically hyperlink screenshots" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\gfx If the value “disablescreenshotautohyperlink” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-46121r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Do not automatically hyperlink screenshots" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO407
- Vuln IDs
-
- V-40864
- Rule IDs
-
- SV-53196r5_rule
Checks: C-47502r10_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous .> "Show OneDrive Sign In" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value “SkyDriveSignInOption” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-46122r4_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Show OneDrive Sign In" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO408
- Vuln IDs
-
- V-40875
- Rule IDs
-
- SV-53207r3_rule
Checks: C-47513r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value “disabledefaultservice” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-46133r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO409
- Vuln IDs
-
- V-40879
- Rule IDs
-
- SV-53211r3_rule
Checks: C-47517r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Restrict programmatic access for creating online presentations in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value “disableprogrammaticaccess” is REG_DWORD = 1 for every user profile hive, this is not a finding.
Fix: F-46137r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO410
- Vuln IDs
-
- V-40880
- Rule IDs
-
- SV-53212r3_rule
Checks: C-47518r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >>"Allow including screenshot with Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value “includescreenshot” is REG_DWORD = 0 for every user profile hive, this is not a finding.
Fix: F-46138r3_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center -> "Allow including screenshot with Office Feedback" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO411
- Vuln IDs
-
- V-40881
- Rule IDs
-
- SV-53213r4_rule
Checks: C-47519r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value “enabled” for every user profile hive is REG_DWORD = 0, this is not a finding.
Fix: F-46139r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO412
- Vuln IDs
-
- V-40882
- Rule IDs
-
- SV-53214r4_rule
Checks: C-47521r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following hive: HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value “requireserververification” for every user profile hive is REG_DWORD = 1, this is not a finding..
Fix: F-46141r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO413
- Vuln IDs
-
- V-40883
- Rule IDs
-
- SV-53215r4_rule
Checks: C-47522r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value “disableomexcatalogs” for every user profile hive is REG_DWORD = 1, this is not a finding.
Fix: F-46142r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO414
- Vuln IDs
-
- V-40884
- Rule IDs
-
- SV-53216r4_rule
Checks: C-47523r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\roaming If the value “roamingsettingsdisabled” for every user profile hive is REG_DWORD = 1, this is not a finding.
Fix: F-46143r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO415
- Vuln IDs
-
- V-40885
- Rule IDs
-
- SV-53217r4_rule
Checks: C-47524r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value “enableupload” for every user profile hive is REG_DWORD = 0, this is not a finding.
Fix: F-46144r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO416
- Vuln IDs
-
- V-40886
- Rule IDs
-
- SV-53218r4_rule
Checks: C-47525r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value “enablefileobfuscation” for every user profile hive is REG_DWORD = 1, this is not a finding.
Fix: F-46145r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO417
- Vuln IDs
-
- V-40887
- Rule IDs
-
- SV-53219r4_rule
Checks: C-47526r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value “enablelogging” for user profile hive is REG_DWORD = 1, this is not a finding.
Fix: F-46146r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" to "Enabled".