Microsoft Publisher 2010 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +17 −17
Comparison against the immediately-prior release (V1R9). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 17
- V-242261 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-242262 Medium Enabling IE Bind to Object functionality must be present.
- V-242263 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-242264 Medium Navigation to URL's embedded in Office products must be blocked.
- V-242265 Medium Scripted Window Security must be enforced.
- V-242266 Medium Add-on Management functionality must be allowed.
- V-242267 Medium Application add-ins must be signed by Trusted Publisher.
- V-242268 Medium Data Execution Prevention must be enforced.
- V-242269 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-242270 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-242271 Medium File Downloads must be configured for proper restrictions.
- V-242272 Medium Protection from zone elevation must be enforced.
- V-242273 Medium ActiveX Installs must be configured for proper restriction.
- V-242274 Medium Warning Bar settings for VBA macros must be configured.
- V-242275 Medium Fatally corrupt files must be blocked from opening.
- V-242276 Medium The Publisher Automation Security Level must be configured for high security.
- V-265898 High The version of Microsoft Publisher running on the system must be a supported version.
Removed rules 17
- V-17173 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-17174 Medium Enabling IE Bind to Object functionality must be present.
- V-17175 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-17183 Medium Navigation to URL's embedded in Office products must be blocked.
- V-17184 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-17187 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-17545 Medium Warning Bar settings for VBA macros must be configured.
- V-26584 Medium Add-on Management functionality must be allowed.
- V-26585 Medium Protection from zone elevation must be enforced.
- V-26586 Medium ActiveX Installs must be configured for proper restriction.
- V-26587 Medium File Downloads must be configured for proper restrictions.
- V-26588 Medium Scripted Window Security must be enforced.
- V-26589 Medium Application add-ins must be signed by Trusted Publisher.
- V-26590 Medium Data Execution Prevention must be enforced.
- V-26625 Medium Disable UI extending from documents and templates must be disallowed.
- V-26707 Medium Fatally corrupt files must be blocked from opening.
- V-26708 Medium The Publisher Automation Security Level must be configured for high security.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104 - Publisher
- Vuln IDs
-
- V-242261
- V-17173
- Rule IDs
-
- SV-242261r961092_rule
- SV-33895
Checks: C-45536r710617_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" must be "Enabled" and a check in the "mspub.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45494r710618_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the "mspub.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111 - Publisher
- Vuln IDs
-
- V-242262
- V-17174
- Rule IDs
-
- SV-242262r960921_rule
- SV-33890
Checks: C-45537r710620_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the "mspub.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45495r710621_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the "mspub.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117 - Publisher
- Vuln IDs
-
- V-242263
- V-17175
- Rule IDs
-
- SV-242263r961092_rule
- SV-33919
Checks: C-45538r710623_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the "mspub.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45496r710624_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the "mspub.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123 - Publisher
- Vuln IDs
-
- V-242264
- V-17183
- Rule IDs
-
- SV-242264r961092_rule
- SV-33900
Checks: C-45539r710626_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the "mspub.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45497r710627_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the "mspub.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124 - Publisher
- Vuln IDs
-
- V-242265
- V-26588
- Rule IDs
-
- SV-242265r960921_rule
- SV-33922
Checks: C-45540r710629_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" must be set to "Enabled" and "mspub.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45498r710630_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and "mspub.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126 - Publisher
- Vuln IDs
-
- V-242266
- V-26584
- Rule IDs
-
- SV-242266r961086_rule
- SV-33887
Checks: C-45541r710632_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Ofice 2010 (Machine) -> Security Settings -> IE Security "Add-on Management" must be set to "Enabled" and "mspub.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45499r710633_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and "mspub.exe" is checked.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127 - Publisher
- Vuln IDs
-
- V-242267
- V-26589
- Rule IDs
-
- SV-242267r960954_rule
- SV-33929
Checks: C-45542r710635_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\publisher\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-45500r710636_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO128 - Publisher
- Vuln IDs
-
- V-242268
- V-26590
- Rule IDs
-
- SV-242268r961092_rule
- SV-33926
Checks: C-45543r710638_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\publisher\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-45501r710639_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129 - Publisher
- Vuln IDs
-
- V-242269
- V-17184
- Rule IDs
-
- SV-242269r961086_rule
- SV-33894
Checks: C-45544r710641_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and "mspub.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45502r710642_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select "mspub.exe".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131 - Publisher
- Vuln IDs
-
- V-242270
- V-17187
- Rule IDs
-
- SV-242270r960954_rule
- SV-33928
Checks: C-45545r710644_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\publisher\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-45503r710645_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132 - Publisher
- Vuln IDs
-
- V-242271
- V-26587
- Rule IDs
-
- SV-242271r961089_rule
- SV-33916
Checks: C-45546r710647_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" must be set to "Enabled" and "mspub.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45504r710648_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and "mspub.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209 - Publisher
- Vuln IDs
-
- V-242272
- V-26585
- Rule IDs
-
- SV-242272r960921_rule
- SV-33901
Checks: C-45547r710650_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" must be set to "Enabled" and "mspub.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45505r710651_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and "mspub.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211 - Publisher
- Vuln IDs
-
- V-242273
- V-26586
- Rule IDs
-
- SV-242273r961779_rule
- SV-33905
Checks: C-45548r710653_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" must be set to "Enabled" and "mspub.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45506r710654_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and "mspub.exe" is checked.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304 - Publisher
- Vuln IDs
-
- V-242274
- V-17545
- Rule IDs
-
- SV-242274r960963_rule
- SV-33930
Checks: C-45549r710656_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010-> Security -> Trust Center "VBA Macro Notification Settings" must be "Enabled (Disabled all with notifications)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\publisher\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-45507r710657_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010-> Security -> Trust Center "VBA Macro Notification Settings" to "Enabled (Disabled all with notifications)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO322 - Publisher
- Vuln IDs
-
- V-242275
- V-26707
- Rule IDs
-
- SV-242275r961086_rule
- SV-34092
Checks: C-45550r710659_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\publisher Criteria: If the value PromptForBadFiles is REG_DWORD = 0, this is not a finding.
Fix: F-45508r710660_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO323 - Publisher
- Vuln IDs
-
- V-242276
- V-26708
- Rule IDs
-
- SV-242276r961092_rule
- SV-34093
Checks: C-45551r710662_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security "Publisher Automation Security Level" must be set to "Enabled and High (Disabled)" is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurityPublisher is REG_DWORD = 3, this is not a finding.
Fix: F-45509r710663_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security "Publisher Automation Security Level" to "Enabled and High (Disabled)" is selected.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO999 - Publisher
- Vuln IDs
-
- V-265898
- Rule IDs
-
- SV-265898r999898_rule
Checks: C-69817r999896_chk
Microsoft Publisher 2010 is no longer supported by the vendor. If the system is running Microsoft Publisher 2010, this is a finding.
Fix: F-69721r999897_fix
Upgrade to a supported version.