Microsoft PowerPoint 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +38 −37
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 38
- V-238054 Medium Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint.
- V-238055 Medium Blocking as default file block opening behavior must be enforced.
- V-238056 Medium The Internet Explorer Bind to Object functionality must be enabled in PowerPoint.
- V-238057 Medium The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint.
- V-238058 Medium Configuration for file validation must be enforced.
- V-238059 Medium Files from the Internet zone must be opened in Protected View.
- V-238060 Medium Navigation to URLs embedded in Office products must be blocked in PowerPoint.
- V-238061 Medium Scripted Window Security must be enforced in PowerPoint.
- V-238062 Medium Add-on Management functionality must be allowed in PowerPoint.
- V-238063 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-238064 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint.
- V-238065 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-238066 Medium File Downloads must be configured for proper restrictions in PowerPoint.
- V-238067 Medium All automatic loading from trusted locations must be disabled.
- V-238068 Medium Disallowance of trusted locations on the network must be enforced.
- V-238069 Medium The Save commands default file format must be configured.
- V-238070 Medium The scanning of encrypted macros in open XML documents must be enforced.
- V-238071 Medium Trust access for VBA must be disallowed.
- V-238072 Medium Protection from zone elevation must be enforced in PowerPoint.
- V-238073 Medium ActiveX Installs must be configured for proper restriction in PowerPoint.
- V-238074 Medium Files in unsafe locations must be opened in Protected View.
- V-238075 Medium The ability to run programs from a PowerPoint presentation must be disallowed.
- V-238076 Medium Document behavior if file validation fails must be set.
- V-238077 Medium Attachments opened from Outlook must be in Protected View.
- V-238078 Medium Warning Bar settings for VBA macros must be configured.
- V-238079 Medium Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint Viewer.
- V-238080 Medium The Internet Explorer Bind to Object functionality must be enabled in PowerPoint Viewer.
- V-238081 Medium The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint Viewer.
- V-238082 Medium Navigation to URLs embedded in Office products must be blocked in PowerPoint Viewer.
- V-238083 Medium Scripted Window Security must be enforced in PowerPoint Viewer.
- V-238084 Medium Add-on Management functionality must be allowed in PowerPoint Viewer.
- V-238085 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint Viewer.
- V-238086 Medium File Downloads must be configured for proper restrictions in PowerPoint Viewer.
- V-238087 Medium Protection from zone elevation must be enforced in PowerPoint Viewer.
- V-238088 Medium ActiveX Installs must be configured for proper restriction in PowerPoint Viewer.
- V-238089 Medium Macros must be blocked from running in Office files from the Internet.
- V-238090 Medium Files on local Intranet UNC must be opened in Protected View.
- V-279946 High The version of PowerPoint running on the system must be a supported version.
Removed rules 37
- V-70641 Medium Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint.
- V-70643 Medium Blocking as default file block opening behavior must be enforced.
- V-70645 Medium The Internet Explorer Bind to Object functionality must be enabled in PowerPoint.
- V-70647 Medium The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint.
- V-70649 Medium Configuration for file validation must be enforced.
- V-70651 Medium Files from the Internet zone must be opened in Protected View.
- V-70653 Medium Add-on Management functionality must be allowed in PowerPoint.
- V-70655 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-70657 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint.
- V-70659 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-70661 Medium File Downloads must be configured for proper restrictions in PowerPoint.
- V-70663 Medium All automatic loading from trusted locations must be disabled.
- V-70665 Medium Disallowance of trusted locations on the network must be enforced.
- V-70667 Medium The Save commands default file format must be configured.
- V-70669 Medium The scanning of encrypted macros in open XML documents must be enforced.
- V-70671 Medium Trust access for VBA must be disallowed.
- V-70673 Medium Protection from zone elevation must be enforced in PowerPoint.
- V-70675 Medium ActiveX Installs must be configured for proper restriction in PowerPoint.
- V-70677 Medium The ability to run programs from a PowerPoint presentation must be disallowed.
- V-70679 Medium Attachments opened from Outlook must be in Protected View.
- V-70681 Medium Warning Bar settings for VBA macros must be configured.
- V-70683 Medium Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint Viewer.
- V-70685 Medium The Internet Explorer Bind to Object functionality must be enabled in PowerPoint Viewer.
- V-70687 Medium The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint Viewer.
- V-70689 Medium Navigation to URLs embedded in Office products must be blocked in PowerPoint Viewer.
- V-70691 Medium Scripted Window Security must be enforced in PowerPoint Viewer.
- V-70693 Medium Add-on Management functionality must be allowed in PowerPoint Viewer.
- V-70695 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint Viewer.
- V-70697 Medium Protection from zone elevation must be enforced in PowerPoint Viewer.
- V-70699 Medium ActiveX Installs must be configured for proper restriction in PowerPoint Viewer.
- V-70701 Medium Macros must be blocked from running in Office files from the Internet.
- V-71401 Medium Navigation to URLs embedded in Office products must be blocked in PowerPoint.
- V-71403 Medium Scripted Window Security must be enforced in PowerPoint.
- V-71405 Medium Files in unsafe locations must be opened in Protected View.
- V-71407 Medium Document behavior if file validation fails must be set.
- V-71641 Medium Files on local Intranet UNC must be opened in Protected View.
- V-71647 Medium File Downloads must be configured for proper restrictions in PowerPoint Viewer.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-238054
- V-70641
- Rule IDs
-
- SV-238054r961092_rule
- SV-85263
Checks: C-41264r651093_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41223r651094_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO110
- Vuln IDs
-
- V-238055
- V-70643
- Rule IDs
-
- SV-238055r961086_rule
- SV-85265
Checks: C-41265r651096_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-41224r651097_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-238056
- V-70645
- Rule IDs
-
- SV-238056r960921_rule
- SV-85267
Checks: C-41266r651099_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41225r651100_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-238057
- V-70647
- Rule IDs
-
- SV-238057r961092_rule
- SV-85269
Checks: C-41267r651102_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41226r651103_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO119
- Vuln IDs
-
- V-238058
- V-70649
- Rule IDs
-
- SV-238058r960921_rule
- SV-85271
Checks: C-41268r651105_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security "Turn off file validation" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Criteria: If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-41227r651106_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO121
- Vuln IDs
-
- V-238059
- V-70651
- Rule IDs
-
- SV-238059r961086_rule
- SV-85273
Checks: C-41269r651108_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" is set to "Not Configured" or "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview Criteria: If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, then this is a finding.
Fix: F-41228r651109_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View to "Not Configured" or "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-238060
- V-71401
- Rule IDs
-
- SV-238060r961092_rule
- SV-86025
Checks: C-41270r651111_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41229r651112_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-238061
- V-71403
- Rule IDs
-
- SV-238061r960921_rule
- SV-86027
Checks: C-41271r651114_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41230r651115_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-238062
- V-70653
- Rule IDs
-
- SV-238062r961086_rule
- SV-85275
Checks: C-41272r651117_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41231r651118_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-238063
- V-70655
- Rule IDs
-
- SV-238063r960954_rule
- SV-85277
Checks: C-41273r651120_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-41232r651121_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-238064
- V-70657
- Rule IDs
-
- SV-238064r961086_rule
- SV-85279
Checks: C-41274r651123_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41233r651124_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-238065
- V-70659
- Rule IDs
-
- SV-238065r960954_rule
- SV-85281
Checks: C-41275r651126_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\powerpoint\security Criteria: If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-41234r651127_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-238066
- V-70661
- Rule IDs
-
- SV-238066r961089_rule
- SV-85283
Checks: C-41276r651129_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41235r651130_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO133
- Vuln IDs
-
- V-238067
- V-70663
- Rule IDs
-
- SV-238067r961092_rule
- SV-85285
Checks: C-41277r651132_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-41236r651133_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO134
- Vuln IDs
-
- V-238068
- V-70665
- Rule IDs
-
- SV-238068r961092_rule
- SV-85287
Checks: C-41278r651135_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-41237r651136_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO139
- Vuln IDs
-
- V-238069
- V-70667
- Rule IDs
-
- SV-238069r960963_rule
- SV-85289
Checks: C-41279r651138_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Save "default file format" is set to "Enabled: PowerPoint Presentation (*.pptx)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\options Criteria: If the value DefaultFormat is REG_DWORD = 1b (hex) or 27 (decimal), this is not a finding.
Fix: F-41238r651139_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Save "default file format" to "Enabled: PowerPoint Presentation (*.pptx)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO142
- Vuln IDs
-
- V-238070
- V-70669
- Rule IDs
-
- SV-238070r961092_rule
- SV-85291
Checks: C-41280r651141_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security "Scan encrypted macros in PowerPoint Open XML presentations" is set to "Disabled". The option 'Enabled: Scan encrypted macros (default)' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security Criteria: If the value PowerPointBypassEncryptedMacroScan does not exist, this not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-41239r651142_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security "Scan encrypted macros in PowerPoint Open XML presentations" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO146
- Vuln IDs
-
- V-238071
- V-70671
- Rule IDs
-
- SV-238071r960963_rule
- SV-85293
Checks: C-41281r651144_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Trust access to Visual Basic Project" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security Criteria: If the value AccessVBOM is REG_DWORD=0, this is not a finding.
Fix: F-41240r651145_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Trust access to Visual Basic Project" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-238072
- V-70673
- Rule IDs
-
- SV-238072r960921_rule
- SV-85295
Checks: C-41282r651147_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41241r651148_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-238073
- V-70675
- Rule IDs
-
- SV-238073r961779_rule
- SV-85297
Checks: C-41283r651150_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'powerpnt.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value powerpnt.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41242r651151_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'powerpnt.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO288
- Vuln IDs
-
- V-238074
- V-71405
- Rule IDs
-
- SV-238074r961092_rule
- SV-86029
Checks: C-41284r651153_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" is set to "Not Configured" or "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview Criteria: If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, then this is a finding.
Fix: F-41243r651154_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" to "Not Configured" or "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO289
- Vuln IDs
-
- V-238075
- V-70677
- Rule IDs
-
- SV-238075r961092_rule
- SV-85301
Checks: C-41285r651156_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security "Run Programs" is set to "Disabled". The option 'Enabled: disable (don't run any programs)' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security Criteria: If the value RunPrograms does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-41244r651157_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security "Run Programs" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO292
- Vuln IDs
-
- V-238076
- V-71407
- Rule IDs
-
- SV-238076r961092_rule
- SV-86031
Checks: C-41286r651159_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" is set to "Disabled". The option 'Enabled: Open in Protected View' and Unchecked for 'Do not allow edit' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Criteria: If the value openinprotectedview does not exist, this is not a finding. If the value is REG_DWORD = 1, this is not a finding. If the value DisableEditFromPV is set to REG_DWORD = 1, this is not a finding. If the value is set to REG_DWORD = 0, this is a finding.
Fix: F-41245r651160_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO293
- Vuln IDs
-
- V-238077
- V-70679
- Rule IDs
-
- SV-238077r961092_rule
- SV-85303
Checks: C-41287r651162_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview Criteria: If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-41246r651163_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-238078
- V-70681
- Rule IDs
-
- SV-238078r960963_rule
- SV-85305
Checks: C-41288r651165_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "VBA Macro Notification Settings" is set to "Enabled: Disable all with notification". The options 'Enabled: Disable all except digitally signed macros' and 'Enabled: Disable all without notification' are more restrictive and also acceptable values. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\powerpoint\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding. Values of REG_DWORD = 3 or 4 are also acceptable values. If the registry key does not exist or the value is REG_DWORD = 1, then this is a finding.
Fix: F-41247r651166_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "VBA Macro Notification Settings" to "Enabled (Disable all with notification)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO501
- Vuln IDs
-
- V-238079
- V-70683
- Rule IDs
-
- SV-238079r961092_rule
- SV-85307
Checks: C-41289r651168_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41248r651169_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO502
- Vuln IDs
-
- V-238080
- V-70685
- Rule IDs
-
- SV-238080r960921_rule
- SV-85309
Checks: C-41290r651171_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41249r651172_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO503
- Vuln IDs
-
- V-238081
- V-70687
- Rule IDs
-
- SV-238081r961092_rule
- SV-85311
Checks: C-41291r651174_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41250r651175_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO504
- Vuln IDs
-
- V-238082
- V-70689
- Rule IDs
-
- SV-238082r961092_rule
- SV-85313
Checks: C-41292r651177_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41251r651178_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO505
- Vuln IDs
-
- V-238083
- V-70691
- Rule IDs
-
- SV-238083r960921_rule
- SV-85315
Checks: C-41293r651180_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41252r651181_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in he 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO506
- Vuln IDs
-
- V-238084
- V-70693
- Rule IDs
-
- SV-238084r961086_rule
- SV-85317
Checks: C-41294r651183_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41253r651184_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO507
- Vuln IDs
-
- V-238085
- V-70695
- Rule IDs
-
- SV-238085r961086_rule
- SV-85319
Checks: C-41295r651186_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41254r651187_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO508
- Vuln IDs
-
- V-238086
- V-71647
- Rule IDs
-
- SV-238086r961089_rule
- SV-86271
Checks: C-41296r651189_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41255r651190_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO509
- Vuln IDs
-
- V-238087
- V-70697
- Rule IDs
-
- SV-238087r960921_rule
- SV-85321
Checks: C-41297r651192_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41256r651193_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO510
- Vuln IDs
-
- V-238088
- V-70699
- Rule IDs
-
- SV-238088r961779_rule
- SV-85323
Checks: C-41298r651195_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'pptview.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value pptview.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41257r651196_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'pptview.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO600
- Vuln IDs
-
- V-238089
- V-70701
- Rule IDs
-
- SV-238089r961092_rule
- SV-85325
Checks: C-41299r651198_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\powerpoint\security Criteria: If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-41258r651199_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO605
- Vuln IDs
-
- V-238090
- V-71641
- Rule IDs
-
- SV-238090r961092_rule
- SV-86265
Checks: C-41300r651201_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Open files on local Intranet UNC in Protected View" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview Criteria: If the value DisableIntranetCheck is REG_DWORD = 0, this is not a finding.
Fix: F-41259r651202_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> PowerPoint Options -> Security -> Trust Center -> Protected View "Open files on local Intranet UNC in Protected View" is set to "Enabled".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTO-PP999
- Vuln IDs
-
- V-279946
- Rule IDs
-
- SV-279946r1156587_rule
Checks: C-84507r1156585_chk
PowerPoint 2016 is no longer supported by the vendor. If the system is running PowerPoint 2016, this is a finding.
Fix: F-84412r1156586_fix
Upgrade to a supported version.