Microsoft Office System 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +20 −20
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 20
- V-238024 Medium The Help Improve Proofing Tools feature for Office must be configured.
- V-238025 Medium Trust Bar notifications for Security messages must be enforced.
- V-238026 Medium Rights managed Office Open XML files must be protected.
- V-238027 Medium Document metadata for password protected files must be protected.
- V-238028 Medium The encryption type for password protected Open XML files must be set.
- V-238029 Medium The encryption type for password protected Office 97 thru Office 2003 must be set.
- V-238030 Medium ActiveX control initialization must be disabled.
- V-238031 Medium Load controls in forms3 must be disabled from loading.
- V-238032 Medium Automation Security to enforce macro level security in Office documents must be configured.
- V-238033 Medium A mix of policy and user locations for Office Products must be disallowed.
- V-238034 Medium Smart Documents use of Manifests in Office must be disallowed.
- V-238035 Medium Connection verification of permissions must be enforced.
- V-238036 Medium Inclusion of document properties for PDF and XPS output must be disallowed.
- V-238037 Medium Encrypt document properties must be configured for OLE documents.
- V-238038 Medium Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.
- V-238039 Medium The ability to create an online presentation programmatically must be disabled.
- V-238040 Medium When using the Office Feedback tool, the ability to include a screenshot must be disabled.
- V-238041 Medium The ability to run unsecure Office web add-ins and Catalogs must be disabled.
- V-238042 Medium The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
- V-238043 Medium The ability to send personal information to Office must be disabled.
Removed rules 20
- V-70855 Medium The Help Improve Proofing Tools feature for Office must be configured.
- V-70859 Medium Trust Bar notifications for Security messages must be enforced.
- V-70861 Medium Rights managed Office Open XML files must be protected.
- V-70863 Medium Document metadata for password protected files must be protected.
- V-70865 Medium The encryption type for password protected Open XML files must be set.
- V-70867 Medium The encryption type for password protected Office 97 thru Office 2003 must be set.
- V-70869 Medium ActiveX control initialization must be disabled.
- V-70871 Medium Load controls in forms3 must be disabled from loading.
- V-70873 Medium Automation Security to enforce macro level security in Office documents must be configured.
- V-70875 Medium A mix of policy and user locations for Office Products must be disallowed.
- V-70877 Medium Smart Documents use of Manifests in Office must be disallowed.
- V-70881 Medium Connection verification of permissions must be enforced.
- V-70883 Medium Inclusion of document properties for PDF and XPS output must be disallowed.
- V-70885 Medium Encrypt document properties must be configured for OLE documents.
- V-70889 Medium Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.
- V-70891 Medium The ability to create an online presentation programmatically must be disabled.
- V-70893 Medium When using the Office Feedback tool, the ability to include a screenshot must be disabled.
- V-70895 Medium The ability to run unsecure Office web add-ins and Catalogs must be disabled.
- V-70897 Medium The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
- V-70899 Medium The ability to send personal information to Office must be disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO182
- Vuln IDs
-
- V-238024
- V-70855
- Rule IDs
-
- SV-238024r650639_rule
- SV-85479
Checks: C-41234r650637_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\ptwatson Criteria: If the value PTWOptIn is REG_DWORD = 0, this is not a finding.
Fix: F-41193r650638_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO186
- Vuln IDs
-
- V-238025
- V-70859
- Rule IDs
-
- SV-238025r650642_rule
- SV-85483
Checks: C-41235r650640_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Disable all Trust Bar notifications for security issues" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\trustcenter Criteria: If the value TrustBar is REG_DWORD = 0, this is not a finding.
Fix: F-41194r650641_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO187
- Vuln IDs
-
- V-238026
- V-70861
- Rule IDs
-
- SV-238026r650645_rule
- SV-85485
Checks: C-41236r650643_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-41195r650644_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO188
- Vuln IDs
-
- V-238027
- V-70863
- Rule IDs
-
- SV-238027r650648_rule
- SV-85487
Checks: C-41237r650646_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for password protected files" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value OpenXMLEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-41196r650647_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for password protected files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO189
- Vuln IDs
-
- V-238028
- V-70865
- Rule IDs
-
- SV-238028r650651_rule
- SV-85489
Checks: C-41238r650649_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office Open XML files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-41197r650650_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office Open XML files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO190
- Vuln IDs
-
- V-238029
- V-70867
- Rule IDs
-
- SV-238029r650654_rule
- SV-85491
Checks: C-41239r650652_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office 97-2003 files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value DefaultEncryption12 is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-41198r650653_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO191
- Vuln IDs
-
- V-238030
- V-70869
- Rule IDs
-
- SV-238030r650657_rule
- SV-85493
Checks: C-41240r650655_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "ActiveX Control Initialization" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value UFIControls exists, this is a finding.
Fix: F-41199r650656_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "ActiveX Control Initialization" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO192
- Vuln IDs
-
- V-238031
- V-70871
- Rule IDs
-
- SV-238031r766729_rule
- SV-85495
Checks: C-41241r766727_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" is set to Enabled and 1 from drop-down menu. (For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration.) Use the Windows Registry Editor to navigate to the following key: HKCU\keycupoliciesmsvbasecurity If the value LoadControlsInForms is REG_DWORD=1, this is not a finding.
Fix: F-41200r766728_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Load Controls in Forms3" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO193
- Vuln IDs
-
- V-238032
- V-70873
- Rule IDs
-
- SV-238032r650663_rule
- SV-85497
Checks: C-41242r650661_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix: F-41201r650662_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO196
- Vuln IDs
-
- V-238033
- V-70875
- Rule IDs
-
- SV-238033r650666_rule
- SV-85499
Checks: C-41243r650664_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center "Allow mix of policy and user locations" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security\trusted locations Criteria: If the value Allow User Locations is REG_DWORD = 0, this is not a finding.
Fix: F-41202r650665_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center "Allow mix of policy and user locations" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO197
- Vuln IDs
-
- V-238034
- V-70877
- Rule IDs
-
- SV-238034r650669_rule
- SV-85501
Checks: C-41244r650667_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag Criteria: If the value NeverLoadManifests is REG_DWORD = 1, this is not a finding.
Fix: F-41203r650668_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- DTOO201
- Vuln IDs
-
- V-238035
- V-70881
- Rule IDs
-
- SV-238035r650672_rule
- SV-85505
Checks: C-41245r650670_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Manage Restricted Permissions "Always require users to connect to verify permission" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\drm Criteria: If the value RequireConnection is REG_DWORD = 1, this is not a finding.
Fix: F-41204r650671_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Manage Restricted Permissions "Always require users to connect to verify permission" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO206
- Vuln IDs
-
- V-238036
- V-70883
- Rule IDs
-
- SV-238036r650675_rule
- SV-85507
Checks: C-41246r650673_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\fixedformat Criteria: If the value DisableFixedFormatDocProperties is REG_DWORD = 1, this is not a finding.
Fix: F-41205r650674_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO321
- Vuln IDs
-
- V-238037
- V-70885
- Rule IDs
-
- SV-238037r650678_rule
- SV-85509
Checks: C-41247r650676_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encrypt document properties" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value EncryptDocProps is REG_DWORD = 1, this is not a finding.
Fix: F-41206r650677_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encrypt document properties" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO408
- Vuln IDs
-
- V-238038
- V-70889
- Rule IDs
-
- SV-238038r650681_rule
- SV-85513
Checks: C-41248r650679_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common\broadcast Criteria: If the value disabledefaultservice is REG_DWORD = 1, this is not a finding.
Fix: F-41207r650680_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO409
- Vuln IDs
-
- V-238039
- V-70891
- Rule IDs
-
- SV-238039r650684_rule
- SV-85515
Checks: C-41249r650682_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common\broadcast Criteria: If the value disableprogrammaticaccess is REG_DWORD = 1, this is not a finding.
Fix: F-41208r650683_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO410
- Vuln IDs
-
- V-238040
- V-70893
- Rule IDs
-
- SV-238040r650687_rule
- SV-85517
Checks: C-41250r650685_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Privacy -> Trust Center -> "Allow including screenshot with Office Feedback" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common\feedback Criteria: If the value includescreenshot is REG_DWORD = 0, this is not a finding.
Fix: F-41209r650686_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Privacy -> Trust Center -> "Allow including screenshot with Office Feedback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO412
- Vuln IDs
-
- V-238041
- V-70895
- Rule IDs
-
- SV-238041r650690_rule
- SV-85519
Checks: C-41251r650688_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center -> Trusted Catalogs "Allow Unsecure web add-ins and Catalogs" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\wef\trustedcatalogs Criteria: If the value requireserververification is REG_DWORD = 1, this is not a finding.
Fix: F-41210r650689_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center -> Trusted Catalogs "Allow Unsecure web add-ins and Catalogs" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO416
- Vuln IDs
-
- V-238042
- V-70897
- Rule IDs
-
- SV-238042r650693_rule
- SV-85521
Checks: C-41252r650691_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Telemetry Dashboard -> "Turn on privacy setting in Office Telemetry Agent" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\osm Criteria: If the value enablefileobfuscation is REG_DWORD = 1, this is not a finding.
Fix: F-41211r650692_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Telemetry Dashboard -> "Turn on privacy setting in Office Telemetry Agent" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO601
- Vuln IDs
-
- V-238043
- V-70899
- Rule IDs
-
- SV-238043r650696_rule
- SV-85523
Checks: C-41253r650694_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Privacy -> Trust Center -> "Send personal information" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common Criteria: If the value sendcustomerdata is REG_DWORD = 0, this is not a finding.
Fix: F-41212r650695_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Privacy -> Trust Center -> "Send personal information" to "Disabled".