Microsoft Project 2013 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-242785
- V-17173
- Rule IDs
-
- SV-242785r961092_rule
- SV-53220
Checks: C-46060r716183_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" is "Enabled" and a check in the 'winproj.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46017r716184_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-242786
- V-17174
- Rule IDs
-
- SV-242786r960921_rule
- SV-53221
Checks: C-46061r716186_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" is "Enabled" and a check in the 'winproj.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46018r716187_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-242787
- V-17175
- Rule IDs
-
- SV-242787r961092_rule
- SV-53222
Checks: C-46062r716189_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" is "Enabled" and a check in the 'winproj.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46019r716190_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-242788
- V-17183
- Rule IDs
-
- SV-242788r961092_rule
- SV-53223
Checks: C-46063r716192_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" is "Enabled" and a check in the 'winproj.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46020r716193_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-242789
- V-26588
- Rule IDs
-
- SV-242789r960921_rule
- SV-53224
Checks: C-46064r716195_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46021r716196_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-242790
- V-26584
- Rule IDs
-
- SV-242790r961086_rule
- SV-53225
Checks: C-46065r716198_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46022r716199_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-242791
- V-40888
- Rule IDs
-
- SV-242791r960954_rule
- SV-53226
Checks: C-46066r716201_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\ms project\security Criteria: If the value requireaddinsig is REG_DWORD = 1, this is not a finding.
Fix: F-46023r716202_fix
Set the policy User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-242792
- V-17184
- Rule IDs
-
- SV-242792r961086_rule
- SV-53227
Checks: C-46067r716204_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" is "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46024r716205_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-242793
- V-40889
- Rule IDs
-
- SV-242793r960954_rule
- SV-53228
Checks: C-46068r716207_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security -> Trust Center -> "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\ms project\security Criteria: If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-46025r716208_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security -> Trust Center -> "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-242794
- V-26587
- Rule IDs
-
- SV-242794r961089_rule
- SV-53229
Checks: C-46069r716210_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46026r716211_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-242795
- V-26585
- Rule IDs
-
- SV-242795r960921_rule
- SV-53230
Checks: C-46070r716213_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46027r716214_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-242796
- V-26586
- Rule IDs
-
- SV-242796r961779_rule
- SV-53231
Checks: C-46071r716216_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'winproj.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value winproj.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46028r716217_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'winproj.exe' check box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-242797
- V-40890
- Rule IDs
-
- SV-242797r960963_rule
- SV-53232
Checks: C-46072r716219_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security -> Trust Center -> "VBA Macro Notification Settings" is set to "Enabled: Disable all with notification". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\ms project\security Criteria: If the value vbawarnings is REG_DWORD = 2, this is not a finding.
Fix: F-46029r716220_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security -> Trust Center -> "VBA Macro Notification Settings" must be set to "Enabled: Disable all with notification".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO346
- Vuln IDs
-
- V-242798
- V-40892
- Rule IDs
-
- SV-242798r961092_rule
- SV-53234
Checks: C-46073r716222_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security "Enable untrusted intranet zone access to Project server" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\ms project\security Criteria: If the value TrustWSS is REG_DWORD = 0, this is not a finding.
Fix: F-46030r716223_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Project 2013 -> Project Options -> Security "Enable untrusted intranet zone access to Project server" to "Disabled".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO999-Project13
- Vuln IDs
-
- V-265897
- Rule IDs
-
- SV-265897r999895_rule
Checks: C-69816r999893_chk
Microsoft Project 2013 is no longer supported by the vendor. If the system is running Microsoft Project 2013, this is a finding.
Fix: F-69720r999894_fix
Upgrade to a supported version.