Microsoft Office System 2013 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 40
Comparison against the immediately-prior release (V1R8). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 40
- V-17547 Medium check ActiveX control initialization must be disabled.
- V-17560 Medium check A mix of policy and user locations for Office Products must be disallowed.
- V-17581 Medium check Blogging entries created from inside Office products must be configured for SharePoint only.
- V-17590 Medium check Trust Bar notifications for Security messages must be enforced.
- V-17605 Medium check Document Information panel Beaconing must show UI.
- V-17612 Medium check The Customer Experience Improvement Program for Office must be disabled.
- V-17617 Medium check The encryption type for password protected Office 97 thru Office 2003 must be set.
- V-17619 Medium check The encryption type for password protected Open XML files must be set.
- V-17627 Medium check The Help Improve Proofing Tools feature for Office must be configured.
- V-17659 Medium check Hyperlink warnings for Office must be configured for use.
- V-17660 Medium check Inclusion of document properties for PDF and XPS output must be disallowed.
- V-17661 Medium check The Internet Fax Feature must be disabled.
- V-17664 Medium check The Opt-In Wizard must be disabled.
- V-17669 Medium check Smart Documents use of Manifests in Office must be disallowed.
- V-17670 Medium check Office client polling of SharePoint servers published links must be disabled.
- V-17731 Medium check Connection verification of permissions must be enforced.
- V-17740 Medium check Automatic receiving of small updates to improve reliability must be disallowed.
- V-17749 Medium check Legacy format signatures must be enabled.
- V-17759 Medium check Documents must be configured to not open as Read Write when browsing.
- V-17768 Medium check Document metadata for password protected files must be protected.
- V-17769 Medium check Rights managed Office Open XML files must be protected.
- V-17773 Medium check Relying on Vector markup Language (VML) for displaying graphics in browsers must be disallowed.
- V-17805 Medium check External Signature Services Menu for Office must be suppressed.
- V-26630 Medium check Online content options must be configured for offline content availability.
- V-26704 Medium check Encrypt document properties must be configured for OLE documents.
- V-40860 Medium check The video informing a user about signing into Office365 must be disabled.
- V-40861 Medium check The first-run prompt to sign into Office365 must be disabled.
- V-40862 Medium check The ability to sign into Office365 must be disabled.
- V-40863 Medium check The ability to automatically hyperlink screenshots within Word, PowerPoint, Excel and Outlook must be disabled.
- V-40864 Medium check The prompt to save to OneDrive (formerly SkyDrive) must be disabled.
- V-40875 Medium check Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.
- V-40879 Medium check The ability to create an online presentation programmatically must be disabled.
- V-40880 Medium check When using the Office Feedback tool, the ability to include a screenshot must be disabled.
- V-40881 Medium check The Office Feedback tool must be disabled.
- V-40882 Medium check The ability to run unsecure Office apps must be disabled.
- V-40883 Medium check Users must be prevented from using or inserting apps that come from the Office Store.
- V-40884 Medium check Roaming settings must be stored locally and not synchronized to the Microsoft Office roaming settings web service.
- V-40885 Medium check The ability of the Office Telemetry Agent to periodically upload telemetry data to a shared folder must be disabled.
- V-40886 Medium check The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
- V-40887 Medium check The Office Telemetry Agent and Office applications must be configured to collect telemetry data.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO191
- Vuln IDs
-
- V-17547
- Rule IDs
-
- SV-52728r4_rule
Checks: C-47056r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "ActiveX Control Initialization" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Security If the value “UFIControls” exists, this is a finding.
Fix: F-45653r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "ActiveX Control Initialization" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO196
- Vuln IDs
-
- V-17560
- Rule IDs
-
- SV-52745r4_rule
Checks: C-47074r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center "Allow mix of policy and user locations" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security\trusted locations If the value “Allow User Locations” is REG_DWORD = 0, this is not a finding.
Fix: F-45671r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings -> Trust Center "Allow mix of policy and user locations" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO212
- Vuln IDs
-
- V-17581
- Rule IDs
-
- SV-52756r4_rule
Checks: C-47085r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous "Control Blogging" is set to "Enabled (Only SharePoint blogs allowed)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Blog If the value “DisableBlog” is REG_DWORD = 1, this is not a finding.
Fix: F-45682r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous "Control Blogging" to "Enabled (Only SharePoint blogs allowed)".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- DTOO200
- Vuln IDs
-
- V-17583
- Rule IDs
-
- SV-52749r4_rule
Checks: C-47078r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm If the value “IncludeHTML” is REG_DWORD = 0, this is not a finding.
Fix: F-45675r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Allow users with earlier versions of Office to read with browsers" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO186
- Vuln IDs
-
- V-17590
- Rule IDs
-
- SV-52723r4_rule
Checks: C-47051r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable all Trust Bar notifications for security issues" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\trustcenter If the value “TrustBar” is REG_DWORD = 0, this is not a finding.
Fix: F-45648r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO207
- Vuln IDs
-
- V-17605
- Rule IDs
-
- SV-52754r4_rule
Checks: C-47083r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Document Information Panel "Document Information Panel Beaconing UI" is set to "Enabled (Always show UI)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\documentinformationpanel If the value “Beaconing” is REG_DWORD = 1, this is not a finding.
Fix: F-45680r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Document Information Panel "Document Information Panel Beaconing UI" to "Enabled (Always show UI)".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO184
- Vuln IDs
-
- V-17612
- Rule IDs
-
- SV-52721r4_rule
Checks: C-47049r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Enable Customer Experience Improvement Program" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common Criteria: If the value “QMEnable” is REG_DWORD = 0, this is not a finding.
Fix: F-45646r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Enable Customer Experience Improvement Program" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO190
- Vuln IDs
-
- V-17617
- Rule IDs
-
- SV-52727r5_rule
Checks: C-47055r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office 97-2003 files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “DefaultEncryption12” is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256", this is not a finding.
Fix: F-45652r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO189
- Vuln IDs
-
- V-17619
- Rule IDs
-
- SV-52726r5_rule
Checks: C-47054r7_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encryption type for password protected Office Open XML files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “OpenXMLEncryption” is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider, AES 256,256", this is not a finding.
Fix: F-45651r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encryption type for password protected Office Open XML files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO182
- Vuln IDs
-
- V-17627
- Rule IDs
-
- SV-52719r5_rule
Checks: C-47047r7_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> Spelling >> Proofing Data Collection "Improve Proofing Tools" is set to "Disabled". Use the Windows Registry Editor to navigate to the following. HKCU\Software\Policies\Microsoft\Office\15.0\common\ptwatson If the value “PTWOptIn” is REG_DWORD = 0, this is not a finding.
Fix: F-45644r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO194
- Vuln IDs
-
- V-17659
- Rule IDs
-
- SV-52731r4_rule
Checks: C-47059r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Suppress hyperlink warnings" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value “DisableHyperLinkWarning” is REG_DWORD = 0, this is not a finding.
Fix: F-45656r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Suppress hyperlink warnings" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO206
- Vuln IDs
-
- V-17660
- Rule IDs
-
- SV-52753r4_rule
Checks: C-47082r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\fixedformat If the value “DisableFixedFormatDocProperties” is REG_DWORD = 1, this is not a finding.
Fix: F-45679r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO198
- Vuln IDs
-
- V-17661
- Rule IDs
-
- SV-52747r4_rule
Checks: C-47076r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> Fax "Disable Internet Fax feature" to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\services\fax If the value “NoFax” is REG_DWORD = 1, this is not a finding.
Fix: F-45673r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Services -> Fax "Disable Internet Fax feature" to "Enabled"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO183
- Vuln IDs
-
- V-17664
- Rule IDs
-
- SV-52720r5_rule
Checks: C-47048r7_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Disable Opt-in Wizard on first run" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value “ShownFirstRunOptin” is REG_DWORD = 1, this is not a finding.
Fix: F-45645r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Disable Opt-in Wizard on first run" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO195
- Vuln IDs
-
- V-17665
- Rule IDs
-
- SV-52744r2_rule
Checks: C-47073r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “DisablePasswordUI” is REG_DWORD = 0, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Disable password to open UI" to "Disabled".
Fix: F-45670r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Disable password to open UI" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO197
- Vuln IDs
-
- V-17669
- Rule IDs
-
- SV-52746r4_rule
Checks: C-47075r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag If the value “NeverLoadManifests” is REG_DWORD = 1, this is not a finding.
Fix: F-45672r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" to "Enabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- DTOO208
- Vuln IDs
-
- V-17670
- Rule IDs
-
- SV-52755r4_rule
Checks: C-47084r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Server Settings "Disable the Office client from polling the SharePoint Server for published links" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\portal If the value “LinkPublishingDisabled” is REG_DWORD = 1, this is not a finding.
Fix: F-45681r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Server Settings "Disable the Office client from polling the SharePoint Server for published links" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- DTOO201
- Vuln IDs
-
- V-17731
- Rule IDs
-
- SV-52750r4_rule
Checks: C-47079r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Always require users to connect to verify permission" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value “RequireConnection” is REG_DWORD = 1, this is not a finding.
Fix: F-45676r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Always require users to connect to verify permission" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO185
- Vuln IDs
-
- V-17740
- Rule IDs
-
- SV-52722r4_rule
Checks: C-47050r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center "Automatically receive small updates to improve reliability" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common If the value “UpdateReliabilityData” is REG_DWORD = 0, this is not a finding.
Fix: F-45647r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center "Automatically receive small updates to improve reliability" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO193
- Vuln IDs
-
- V-17741
- Rule IDs
-
- SV-52730r3_rule
Checks: C-47058r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\Common\Security If the value “AutomationSecurity” is REG_DWORD = 2 for all user profile hives, this is not a finding.
Fix: F-45655r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO203
- Vuln IDs
-
- V-17749
- Rule IDs
-
- SV-52751r4_rule
Checks: C-47080r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures If the value “EnableCreationOfWeakXPSignatures” is REG_DWORD = 1, this is not a finding. Fix Text: Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Legacy format signatures" to "Enabled".
Fix: F-45677r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Legacy format signatures" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO192
- Vuln IDs
-
- V-17750
- Rule IDs
-
- SV-52729r4_rule
Checks: C-47057r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Load Controls in Forms3" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\keycupoliciesmsvbasecurity If the value “LoadControlsInForms” exists, this is a finding.
Fix: F-45654r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Load Controls in Forms3" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO179
- Vuln IDs
-
- V-17759
- Rule IDs
-
- SV-52714r6_rule
Checks: C-47042r10_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value “OpenDocumentsReadWriteWhileBrowsing” for REG_DWORD = 0, this is not a finding.
Fix: F-45638r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools | Options | General | Web Options... >> Files "Open Office documents as read/write while browsing" to "Disabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- DTOO199
- Vuln IDs
-
- V-17765
- Rule IDs
-
- SV-52748r3_rule
Checks: C-47077r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\drm Criteria: If the value “DisableCreation” is REG_DWORD = 0 for every users profile hive, this is not a finding.
Fix: F-45674r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Manage Restricted Permissions "Prevent users from changing permissions on rights managed content" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO188
- Vuln IDs
-
- V-17768
- Rule IDs
-
- SV-52725r4_rule
Checks: C-47053r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for password protected files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “OpenXMLEncryptProperty” is REG_DWORD = 1, this is not a finding.
Fix: F-45650r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for password protected files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO187
- Vuln IDs
-
- V-17769
- Rule IDs
-
- SV-52724r4_rule
Checks: C-47052r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security If the value “DRMEncryptProperty” is REG_DWORD = 1, this is not a finding.
Fix: F-45649r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO180
- Vuln IDs
-
- V-17773
- Rule IDs
-
- SV-52715r4_rule
Checks: C-47043r8_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Web Options >> Browsers "Rely on VML for displaying graphics in browsers" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet. If the value “RelyOnVML” is REG_DWORD = 0, this is not a finding.
Fix: F-45640r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Tools \ Options \ General \ Web Options -> Browsers "Rely on VML for displaying graphics in browsers" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO204
- Vuln IDs
-
- V-17805
- Rule IDs
-
- SV-52752r4_rule
Checks: C-47081r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Signing "Suppress external signature services menu item" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signatures Criteria: If the value “SuppressExtSigningSvcs” is REG_DWORD = 1, this is not a finding.
Fix: F-45678r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Signing "Suppress external signature services menu item" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO345
- Vuln IDs
-
- V-26630
- Rule IDs
-
- SV-52758r5_rule
Checks: C-47087r6_chk
Note: This check is Not Applicable when the use of Office 365 is against the specific DoD instance of O365. The use of Offline Content for Non-DoD instances of O365 is prohibited and it must not allow for personal account synchronization. All non-DoD instances are subject to this requirement. Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" is set to "Enabled: Do not allow Office to connect to the internet". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\internet If the value “UseOnlineContent” is REG_DWORD = 0, this is not a finding.
Fix: F-45684r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Tools >> Options >> General >> Service Options... >> Online Content "Online content options" to "Enabled: Do not allow Office to connect to the internet".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO321
- Vuln IDs
-
- V-26704
- Rule IDs
-
- SV-52757r4_rule
Checks: C-47086r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings "Encrypt document properties" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\security Criteria: If the value “EncryptDocProps” is REG_DWORD = 1, this is not a finding.
Fix: F-45683r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Security Settings "Encrypt document properties" to "Enabled".
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- DTOO401
- Vuln IDs
-
- V-40858
- Rule IDs
-
- SV-53190r1_rule
Checks: C-47496r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" is set to "Enabled". Verify the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" is set to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:" both point to an Intranet system. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value EnableAutomaticUpdates is REG_DWORD = 1, this is not a finding. If the registry key is missing, this is an Open finding. This setting is, by default, enabled and must be explicitly configured to be disabled. HKLM\software\policies\Microsoft\Windows\WindowsUpdate Criteria: If the value of WUServer and WUStatusServer are populated with an Intranet system, this is not a finding.
Fix: F-46116r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Enable Automatic Updates" to "Enabled". Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Updates -> "Specify intranet Microsoft update service location" to "Enabled" and the "Set the intranet update service for detecting updates:" and the "Set the intranet statistics server:"to point to an Intranet system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO402
- Vuln IDs
-
- V-40859
- Rule IDs
-
- SV-53191r1_rule
Checks: C-47497r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\policies\Microsoft\office\15.0\common\officeupdate Criteria: If the value HideEnableDisableUpdates is REG_DWORD = 1, this is not a finding.
Fix: F-46117r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine)->Updates->"Hide option to enable or disable updates" is set to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO403
- Vuln IDs
-
- V-40860
- Rule IDs
-
- SV-53192r4_rule
Checks: C-47498r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable First Run Movie" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value “disablemovie” is REG_DWORD = 1, this is not a finding.
Fix: F-46118r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable First Run Movie" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO404
- Vuln IDs
-
- V-40861
- Rule IDs
-
- SV-53193r4_rule
Checks: C-47499r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> First Run >> "Disable Office First Run on application boot" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\firstrun Criteria: If the value “bootedrtm” is REG_DWORD = 1, this is not a finding.
Fix: F-46119r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> First Run -> "Disable Office First Run on application boot" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO405
- Vuln IDs
-
- V-40862
- Rule IDs
-
- SV-53194r4_rule
Checks: C-47500r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Block signing into Office" is set to "Enabled: org ID only". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\signin If the value “signinoptions” is REG_DWORD = 2, this is not a finding.
Fix: F-46120r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Block signing into Office" to "Enabled: org ID only".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO406
- Vuln IDs
-
- V-40863
- Rule IDs
-
- SV-53195r4_rule
Checks: C-47501r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous >> "Do not automatically hyperlink screenshots" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\gfx If the value “disablescreenshotautohyperlink” is REG_DWORD = 1, this is not a finding.
Fix: F-46121r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Do not automatically hyperlink screenshots" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO407
- Vuln IDs
-
- V-40864
- Rule IDs
-
- SV-53196r6_rule
Checks: C-47502r11_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Miscellaneous .> "Show OneDrive Sign In" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\general If the value “SkyDriveSignInOption” is REG_DWORD = 0, this is not a finding.
Fix: F-46122r4_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Miscellaneous -> "Show OneDrive Sign In" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO408
- Vuln IDs
-
- V-40875
- Rule IDs
-
- SV-53207r4_rule
Checks: C-47513r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value “disabledefaultservice” is REG_DWORD = 1, this is not a finding.
Fix: F-46133r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO409
- Vuln IDs
-
- V-40879
- Rule IDs
-
- SV-53211r4_rule
Checks: C-47517r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Present Online >> "Restrict programmatic access for creating online presentations in PowerPoint and Word" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\broadcast If the value “disableprogrammaticaccess” is REG_DWORD = 1, this is not a finding.
Fix: F-46137r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO410
- Vuln IDs
-
- V-40880
- Rule IDs
-
- SV-53212r4_rule
Checks: C-47518r7_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >>"Allow including screenshot with Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value “includescreenshot” is REG_DWORD = 0, this is not a finding.
Fix: F-46138r3_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Privacy -> Trust Center -> "Allow including screenshot with Office Feedback" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO411
- Vuln IDs
-
- V-40881
- Rule IDs
-
- SV-53213r5_rule
Checks: C-47519r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\feedback If the value “enabled” is REG_DWORD = 0, this is not a finding.
Fix: F-46139r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Privacy >> Trust Center >> "Send Office Feedback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO412
- Vuln IDs
-
- V-40882
- Rule IDs
-
- SV-53214r5_rule
Checks: C-47521r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following hive: HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value “requireserververification” is REG_DWORD = 1, this is not a finding.
Fix: F-46141r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Allow Unsecure Apps and Catalogs" to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO413
- Vuln IDs
-
- V-40883
- Rule IDs
-
- SV-53215r5_rule
Checks: C-47522r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\wef\trustedcatalogs If the value “disableomexcatalogs” is REG_DWORD = 1, this is not a finding.
Fix: F-46142r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Security Settings >> Trust Center >> Trusted Catalogs "Block the Office Store" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO414
- Vuln IDs
-
- V-40884
- Rule IDs
-
- SV-53216r5_rule
Checks: C-47523r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\common\roaming If the value “roamingsettingsdisabled” is REG_DWORD = 1, this is not a finding.
Fix: F-46143r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Services >> "Disable Roaming Office User Settings" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO415
- Vuln IDs
-
- V-40885
- Rule IDs
-
- SV-53217r5_rule
Checks: C-47524r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" is set to "Disabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value “enableupload” is REG_DWORD = 0, this is not a finding.
Fix: F-46144r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on data uploading for Office Telemetry Agent" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO416
- Vuln IDs
-
- V-40886
- Rule IDs
-
- SV-53218r5_rule
Checks: C-47525r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value “enablefileobfuscation” is REG_DWORD = 1, this is not a finding.
Fix: F-46145r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO417
- Vuln IDs
-
- V-40887
- Rule IDs
-
- SV-53219r5_rule
Checks: C-47526r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" is set to "Enabled". Use the Windows Registry Editor to navigate to the following HKCU\Software\Policies\Microsoft\Office\15.0\osm If the value “enablelogging” is REG_DWORD = 1, this is not a finding.
Fix: F-46146r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2013 >> Telemetry Dashboard >> "Turn on telemetry data collection" to "Enabled".