Microsoft Office System 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V2R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-238042 Medium descriptioncheckfix The Office Telemetry Agent must be configured to obfuscate the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO182
- Vuln IDs
-
- V-238024
- V-70855
- Rule IDs
-
- SV-238024r961863_rule
- SV-85479
Checks: C-41234r650637_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\ptwatson Criteria: If the value PTWOptIn is REG_DWORD = 0, this is not a finding.
Fix: F-41193r650638_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Tools \ Options \ Spelling -> Proofing Data Collection "Improve Proofing Tools" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO186
- Vuln IDs
-
- V-238025
- V-70859
- Rule IDs
-
- SV-238025r961086_rule
- SV-85483
Checks: C-41235r650640_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Disable all Trust Bar notifications for security issues" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\trustcenter Criteria: If the value TrustBar is REG_DWORD = 0, this is not a finding.
Fix: F-41194r650641_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO187
- Vuln IDs
-
- V-238026
- V-70861
- Rule IDs
-
- SV-238026r961602_rule
- SV-85485
Checks: C-41236r650643_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-41195r650644_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO188
- Vuln IDs
-
- V-238027
- V-70863
- Rule IDs
-
- SV-238027r961128_rule
- SV-85487
Checks: C-41237r650646_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for password protected files" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value OpenXMLEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-41196r650647_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Protect document metadata for password protected files" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO189
- Vuln IDs
-
- V-238028
- V-70865
- Rule IDs
-
- SV-238028r961128_rule
- SV-85489
Checks: C-41238r650649_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office Open XML files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-41197r650650_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office Open XML files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTOO190
- Vuln IDs
-
- V-238029
- V-70867
- Rule IDs
-
- SV-238029r961128_rule
- SV-85491
Checks: C-41239r650652_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office 97-2003 files" is set to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value DefaultEncryption12 is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-41198r650653_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encryption type for password protected Office 97-2003 files" to "Enabled (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO191
- Vuln IDs
-
- V-238030
- V-70869
- Rule IDs
-
- SV-238030r961779_rule
- SV-85493
Checks: C-41240r650655_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "ActiveX Control Initialization" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value UFIControls exists, this is a finding.
Fix: F-41199r650656_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "ActiveX Control Initialization" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO192
- Vuln IDs
-
- V-238031
- V-70871
- Rule IDs
-
- SV-238031r961086_rule
- SV-85495
Checks: C-41241r811510_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" is set to Enabled and 1 from drop-down menu. (For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration.) Setting "Load Controls in Forms3" to disabled is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\vba\security If the value for "LoadControlsInForms3" does not exist or if the value for "LoadControlsInForms" is REG_DWORD=1, this is not a finding.
Fix: F-41200r811511_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" to "Enabled" and 1 from the drop-down menu, or set it to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO193
- Vuln IDs
-
- V-238032
- V-70873
- Rule IDs
-
- SV-238032r961092_rule
- SV-85497
Checks: C-41242r650661_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix: F-41201r650662_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO196
- Vuln IDs
-
- V-238033
- V-70875
- Rule IDs
-
- SV-238033r961863_rule
- SV-85499
Checks: C-41243r650664_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center "Allow mix of policy and user locations" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security\trusted locations Criteria: If the value Allow User Locations is REG_DWORD = 0, this is not a finding.
Fix: F-41202r650665_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center "Allow mix of policy and user locations" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO197
- Vuln IDs
-
- V-238034
- V-70877
- Rule IDs
-
- SV-238034r961863_rule
- SV-85501
Checks: C-41244r650667_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Smart Tag Criteria: If the value NeverLoadManifests is REG_DWORD = 1, this is not a finding.
Fix: F-41203r650668_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Smart Documents (Word, Excel) "Disable Smart Document's use of manifests" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- DTOO201
- Vuln IDs
-
- V-238035
- V-70881
- Rule IDs
-
- SV-238035r961353_rule
- SV-85505
Checks: C-41245r650670_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Manage Restricted Permissions "Always require users to connect to verify permission" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\drm Criteria: If the value RequireConnection is REG_DWORD = 1, this is not a finding.
Fix: F-41204r650671_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Manage Restricted Permissions "Always require users to connect to verify permission" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO206
- Vuln IDs
-
- V-238036
- V-70883
- Rule IDs
-
- SV-238036r961863_rule
- SV-85507
Checks: C-41246r650673_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\fixedformat Criteria: If the value DisableFixedFormatDocProperties is REG_DWORD = 1, this is not a finding.
Fix: F-41205r650674_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Microsoft Save As PDF and XPS add-ins "Disable inclusion of document properties in PDF and XPS output" to "Enabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- DTOO321
- Vuln IDs
-
- V-238037
- V-70885
- Rule IDs
-
- SV-238037r961602_rule
- SV-85509
Checks: C-41247r650676_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encrypt document properties" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security Criteria: If the value EncryptDocProps is REG_DWORD = 1, this is not a finding.
Fix: F-41206r650677_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings "Encrypt document properties" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO408
- Vuln IDs
-
- V-238038
- V-70889
- Rule IDs
-
- SV-238038r960963_rule
- SV-85513
Checks: C-41248r650679_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common\broadcast Criteria: If the value disabledefaultservice is REG_DWORD = 1, this is not a finding.
Fix: F-41207r650680_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO409
- Vuln IDs
-
- V-238039
- V-70891
- Rule IDs
-
- SV-238039r961092_rule
- SV-85515
Checks: C-41249r650682_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common\broadcast Criteria: If the value disableprogrammaticaccess is REG_DWORD = 1, this is not a finding.
Fix: F-41208r650683_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Present Online -> "Restrict programmatic access for creating online presentations in PowerPoint and Word" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO410
- Vuln IDs
-
- V-238040
- V-70893
- Rule IDs
-
- SV-238040r961863_rule
- SV-85517
Checks: C-41250r953847_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Privacy >> Trust Center >> "Allow users to include screenshots and attachments when they submit feedback to Microsoft" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common\feedback If the value "includescreenshot" is "REG_DWORD = 0", this is not a finding.
Fix: F-41209r953848_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Privacy >> Trust Center >> "Allow users to include screenshots and attachments when they submit feedback to Microsoft" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO412
- Vuln IDs
-
- V-238041
- V-70895
- Rule IDs
-
- SV-238041r961863_rule
- SV-85519
Checks: C-41251r650688_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center -> Trusted Catalogs "Allow Unsecure web add-ins and Catalogs" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\wef\trustedcatalogs Criteria: If the value requireserververification is REG_DWORD = 1, this is not a finding.
Fix: F-41210r650689_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Security Settings -> Trust Center -> Trusted Catalogs "Allow Unsecure web add-ins and Catalogs" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO416
- Vuln IDs
-
- V-238042
- V-70897
- Rule IDs
-
- SV-238042r1047204_rule
- SV-85521
Checks: C-41252r1047202_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Telemetry Dashboard >> "Turn on privacy setting in Office Telemetry Agent" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\osm If the value "enablefileobfuscation" is "REG_DWORD = 1", this is not a finding.
Fix: F-41211r1047203_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 .> Telemetry Dashboard >> "Turn on privacy settings in Office Telemetry Agent" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO601
- Vuln IDs
-
- V-238043
- V-70899
- Rule IDs
-
- SV-238043r961863_rule
- SV-85523
Checks: C-41253r650694_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Privacy -> Trust Center -> "Send personal information" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common Criteria: If the value sendcustomerdata is REG_DWORD = 0, this is not a finding.
Fix: F-41212r650695_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2016 -> Privacy -> Trust Center -> "Send personal information" to "Disabled".