Microsoft OneDrive for Business 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-71297
- Rule IDs
-
- SV-85921r1_rule
Checks: C-71693r3_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77609r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-71301
- Rule IDs
-
- SV-85925r1_rule
Checks: C-71697r2_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77613r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-71303
- Rule IDs
-
- SV-85927r1_rule
Checks: C-71699r3_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77615r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-71305
- Rule IDs
-
- SV-85929r1_rule
Checks: C-71703r2_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77619r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-71309
- Rule IDs
-
- SV-85933r1_rule
Checks: C-71705r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77621r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-71311
- Rule IDs
-
- SV-85935r1_rule
Checks: C-71707r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77623r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-71313
- Rule IDs
-
- SV-85937r1_rule
Checks: C-71709r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77627r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-71317
- Rule IDs
-
- SV-85941r1_rule
Checks: C-71713r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77691r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-71319
- Rule IDs
-
- SV-85943r1_rule
Checks: C-71715r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77629r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-71321
- Rule IDs
-
- SV-85945r1_rule
Checks: C-71717r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'groove.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value groove.exe is REG_DWORD = 1, this is not a finding.
Fix: F-77693r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'groove.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO602
- Vuln IDs
-
- V-71323
- Rule IDs
-
- SV-85947r2_rule
Checks: C-71721r7_chk
Note: It is important to load the OneDrive ADMX/L templates under the DISA GPO Baseline Package under the ADMX Templates\OneDrive NextGen in order to view and set the settings appropriately. The DISA GPO Baseline Package can be downloaded from the DoD Cyber Exchange. Verify the policy value for Computer Configuration -> Administrative Templates -> OneDrive -> "Prevent users from using the remote fetch feature to access files on the machine (32-bit)" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\OneDrive\Remote Access Criteria: If the value GPOEnabled is REG_DWORD = 1, this is not a finding.
Fix: F-77631r3_fix
Set the policy value for Computer Configuration -> Administrative Templates -> OneDrive -> "Prevent users from using the remote fetch feature to access files on the machine (32-bit)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO603
- Vuln IDs
-
- V-71327
- Rule IDs
-
- SV-85951r2_rule
Checks: C-71725r11_chk
Note: It is important to load the OneDrive ADMX/L templates under the DISA GPO Baseline Package under the ADMX Templates\OneDrive NextGen in order to view and set the settings appropriately. The DISA GPO Baseline Package can be downloaded from the DoD Cyber Exchange. Verify the policy value for Computer Configuration -> Administrative Templates -> OneDrive -> "Prevent users from using the remote fetch feature to access files on the machine (64-bit)" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Wow6432Node\Microsoft\OneDrive\Remote Access Criteria: If the value GPOEnabled is REG_DWORD = 1, this is not a finding.
Fix: F-77635r2_fix
Set the policy value for Computer Configuration -> Administrative Templates -> OneDrive -> "Prevent users from using the remote fetch feature to access files on the machine (64-bit)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO604
- Vuln IDs
-
- V-71331
- Rule IDs
-
- SV-85955r3_rule
Checks: C-71731r3_chk
Note: It is important to load the OneDrive ADMX/L templates under the DISA GPO Baseline Package under the ADMX Templates\OneDrive NextGen in order to view and set the settings appropriately. The DISA GPO Baseline Package can be downloaded from the DoD Cyber Exchange. Verify the policy value for User Configuration -> Administrative Templates -> OneDrive -> "Prevent users from configuring personal OneDrive accounts" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\SOFTWARE\Microsoft\OneDrive Criteria: If the value DisablePersonalSync is REG_DWORD = 1, this is not a finding.
Fix: F-77643r2_fix
Set the policy value for User Configuration -> Administrative Templates -> OneDrive -> "Prevent users from configuring personal OneDrive acccounts" to "Enabled".