Microsoft Publisher 2013 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Supporting documents 3 PDFs
Bundled by DISA alongside this STIG release: overview, revision history, and readme files. Download the full archive or open an individual PDF.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-242799
- V-17173
- Rule IDs
-
- SV-242799r961092_rule
- SV-53235
Checks: C-46074r716362_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46031r716363_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-242800
- V-40893
- Rule IDs
-
- SV-242800r960921_rule
- SV-53236
Checks: C-46075r716365_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46032r716366_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-242801
- V-40894
- Rule IDs
-
- SV-242801r961092_rule
- SV-53237
Checks: C-46076r716368_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46033r716369_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-242802
- V-40895
- Rule IDs
-
- SV-242802r961092_rule
- SV-53238
Checks: C-46077r716371_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46034r716372_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-242803
- V-40896
- Rule IDs
-
- SV-242803r960921_rule
- SV-53239
Checks: C-46078r716374_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46035r716375_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-242804
- V-26584
- Rule IDs
-
- SV-242804r961086_rule
- SV-53240
Checks: C-46079r716377_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46036r716378_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-242805
- V-26589
- Rule IDs
-
- SV-242805r960954_rule
- SV-53241
Checks: C-46080r716380_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-46037r716381_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-242806
- V-17184
- Rule IDs
-
- SV-242806r961086_rule
- SV-53242
Checks: C-46081r716383_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46038r716384_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select 'mspub.exe'.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-242807
- V-17187
- Rule IDs
-
- SV-242807r960954_rule
- SV-53243
Checks: C-46082r716386_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-46039r716387_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-242808
- V-26587
- Rule IDs
-
- SV-242808r961089_rule
- SV-53244
Checks: C-46083r716389_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46040r716390_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-242809
- V-26585
- Rule IDs
-
- SV-242809r960921_rule
- SV-53245
Checks: C-46084r716392_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46041r716393_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-242810
- V-26586
- Rule IDs
-
- SV-242810r961779_rule
- SV-53246
Checks: C-46085r716395_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46042r716396_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-242811
- V-17545
- Rule IDs
-
- SV-242811r960963_rule
- SV-53248
Checks: C-46086r716398_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "VBA Macro Notification Settings" must be "Enabled (Disabled all with notifications)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-46043r716399_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "VBA Macro Notification Settings" to "Enabled (Disabled all with notifications)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO322
- Vuln IDs
-
- V-242812
- V-26707
- Rule IDs
-
- SV-242812r961086_rule
- SV-53255
Checks: C-46087r716401_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher Criteria: If the value PromptForBadFiles is REG_DWORD = 0, this is not a finding.
Fix: F-46044r716402_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO323
- Vuln IDs
-
- V-242813
- V-26708
- Rule IDs
-
- SV-242813r961092_rule
- SV-53256
Checks: C-46088r716404_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Publisher Automation Security Level" is set to "Enabled and High (Disabled)" is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurityPublisher is REG_DWORD = 3, this is not a finding.
Fix: F-46045r716405_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Publisher Automation Security Level" to "Enabled and High (Disabled)" is selected.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO999-Pub13
- Vuln IDs
-
- V-265899
- Rule IDs
-
- SV-265899r999901_rule
Checks: C-69818r999899_chk
Microsoft Publisher 2013 is no longer supported by the vendor. If the system is running Microsoft Publisher 2013, this is a finding.
Fix: F-69722r999900_fix
Upgrade to a supported version.