Microsoft Publisher 2013 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 16
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 16
- V-17173 Medium description Disabling of user name and password syntax from being used in URLs must be enforced.
- V-17184 Medium description Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-17187 Medium description Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-17545 Medium description Warning Bar settings for VBA macros must be configured.
- V-26584 Medium description Add-on Management functionality must be allowed.
- V-26585 Medium description Protection from zone elevation must be enforced.
- V-26586 Medium description ActiveX Installs must be configured for proper restriction.
- V-26587 Medium description File Downloads must be configured for proper restrictions.
- V-26589 Medium descriptioncheck Add-ins to Office applications must be signed by a Trusted Publisher.
- V-26625 Medium description Publisher 2013 application must be prevented from loading any custom user
- V-26707 Medium description Fatally corrupt files must be blocked from opening.
- V-26708 Medium description The Publisher Automation Security Level must be configured for high security.
- V-40893 Medium description The Internet Explorer Bind to Object functionality must be enabled.
- V-40894 Medium description The Saved from URL mark must be selected to enforce Internet zone processing.
- V-40895 Medium description Navigation to URLs embedded in Office products must be blocked.
- V-40896 Medium description Scripted Window Security must be enforced.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-53235r1_rule
Checks: C-47542r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46162r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-53242r1_rule
Checks: C-47549r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46169r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select 'mspub.exe'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-53243r1_rule
Checks: C-47550r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-46170r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO304
- Vuln IDs
-
- V-17545
- Rule IDs
-
- SV-53248r1_rule
Checks: C-47554r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "VBA Macro Notification Settings" must be "Enabled (Disabled all with notifications)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-46176r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "VBA Macro Notification Settings" to "Enabled (Disabled all with notifications)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO126
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-53240r1_rule
Checks: C-47547r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46167r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-53245r1_rule
Checks: C-47552r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46172r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO211
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-53246r1_rule
Checks: C-47553r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46173r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO132
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-53244r1_rule
Checks: C-47551r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46171r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and 'mspub.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO127
- Vuln IDs
-
- V-26589
- Rule IDs
-
- SV-53241r2_rule
Checks: C-47548r2_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-46168r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO305
- Vuln IDs
-
- V-26625
- Rule IDs
-
- SV-54920r1_rule
Checks: C-48673r2_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Global Options -> Customize -> "Disable UI extending from documents and templates" is set to "Enabled" and "Disallow in Publisher" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\toolbars\publisher Criteria: If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1, this is not a finding.
Fix: F-47787r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Global Options -> Customize -> "Disable UI extending from documents and templates" to "Enabled". Select the policy option for "Disallow in Publisher".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO322
- Vuln IDs
-
- V-26707
- Rule IDs
-
- SV-53255r1_rule
Checks: C-47557r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\publisher Criteria: If the value PromptForBadFiles is REG_DWORD = 0, this is not a finding.
Fix: F-46184r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO323
- Vuln IDs
-
- V-26708
- Rule IDs
-
- SV-53256r1_rule
Checks: C-47558r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Publisher Automation Security Level" is set to "Enabled and High (Disabled)" is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurityPublisher is REG_DWORD = 3, this is not a finding.
Fix: F-46185r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security "Publisher Automation Security Level" to "Enabled and High (Disabled)" is selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO111
- Vuln IDs
-
- V-40893
- Rule IDs
-
- SV-53236r1_rule
Checks: C-47543r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46163r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO117
- Vuln IDs
-
- V-40894
- Rule IDs
-
- SV-53237r1_rule
Checks: C-47544r2_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46164r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO123
- Vuln IDs
-
- V-40895
- Rule IDs
-
- SV-53238r1_rule
Checks: C-47545r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the 'mspub.exe' check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46165r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO124
- Vuln IDs
-
- V-40896
- Rule IDs
-
- SV-53239r1_rule
Checks: C-47546r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46166r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'mspub.exe' is checked.