Microsoft Publisher 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +16 −15
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 16
- V-238482 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-238483 Medium Enabling IE Bind to Object functionality must be present.
- V-238484 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-238485 Medium Navigation to URLs embedded in Office products must be blocked.
- V-238486 Medium Scripted Window Security must be enforced.
- V-238487 Medium Add-on Management functionality must be allowed.
- V-238488 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-238489 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-238490 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-238491 Medium File Downloads must be configured for proper restrictions.
- V-238492 Medium Protection from zone elevation must be enforced.
- V-238493 Medium ActiveX Installs must be configured for proper restriction.
- V-238494 Medium Warning Bar settings for VBA macros must be configured.
- V-238495 Medium Fatally corrupt files must be blocked from opening.
- V-238496 Medium The Publisher Automation Security Level must be configured for high security.
- V-279948 High The version of Publisher running on the system must be a supported version.
Removed rules 15
- V-70729 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-70731 Medium Enabling IE Bind to Object functionality must be present.
- V-70733 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-70735 Medium Navigation to URLs embedded in Office products must be blocked.
- V-70747 Medium Scripted Window Security must be enforced.
- V-70749 Medium Add-on Management functionality must be allowed.
- V-70751 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-70753 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-70755 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-70757 Medium File Downloads must be configured for proper restrictions.
- V-70759 Medium Protection from zone elevation must be enforced.
- V-70761 Medium ActiveX Installs must be configured for proper restriction.
- V-70763 Medium Warning Bar settings for VBA macros must be configured.
- V-71673 Medium Fatally corrupt files must be blocked from opening.
- V-71675 Medium The Publisher Automation Security Level must be configured for high security.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-238482
- V-70729
- Rule IDs
-
- SV-238482r961092_rule
- SV-85353
Checks: C-41693r654778_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41652r654779_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-238483
- V-70731
- Rule IDs
-
- SV-238483r960921_rule
- SV-85355
Checks: C-41694r654781_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41653r654782_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-238484
- V-70733
- Rule IDs
-
- SV-238484r961092_rule
- SV-85357
Checks: C-41695r654784_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41654r654785_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-238485
- V-70735
- Rule IDs
-
- SV-238485r961092_rule
- SV-85359
Checks: C-41696r654787_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41655r654788_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-238486
- V-70747
- Rule IDs
-
- SV-238486r960921_rule
- SV-85371
Checks: C-41697r654790_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41656r654791_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-238487
- V-70749
- Rule IDs
-
- SV-238487r961086_rule
- SV-85373
Checks: C-41698r654793_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41657r654794_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-238488
- V-70751
- Rule IDs
-
- SV-238488r960954_rule
- SV-85375
Checks: C-41699r654796_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\publisher\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-41658r654797_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-238489
- V-70753
- Rule IDs
-
- SV-238489r961086_rule
- SV-85377
Checks: C-41700r654799_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41659r654800_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-238490
- V-70755
- Rule IDs
-
- SV-238490r960954_rule
- SV-85379
Checks: C-41701r654802_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\publisher\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-41660r654803_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-238491
- V-70757
- Rule IDs
-
- SV-238491r961089_rule
- SV-85381
Checks: C-41702r654805_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41661r654806_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-238492
- V-70759
- Rule IDs
-
- SV-238492r960921_rule
- SV-85383
Checks: C-41703r654808_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41662r654809_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-238493
- V-70761
- Rule IDs
-
- SV-238493r961779_rule
- SV-85385
Checks: C-41704r654811_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'mspub.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value mspub.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41663r654812_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'mspub.exe' check box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-238494
- V-70763
- Rule IDs
-
- SV-238494r960963_rule
- SV-85387
Checks: C-41705r654814_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> "VBA Macro Notification Settings" is set to "Enabled: Disable all with notification". The options "Enabled: Disable all except digitally signed macros" and "Enabled: Disable all without notification" are more restrictive and also acceptable values. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\publisher\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding. Values of REG_DWORD = 3 or 4 are also acceptable values. If the registry key does not exist or the value is REG_DWORD = 1, then this is a finding.
Fix: F-41664r654815_fix
Set the policy value User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> "VBA Macro Notification Settings" to "Enabled (Disabled all with notifications)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO322
- Vuln IDs
-
- V-238495
- V-71673
- Rule IDs
-
- SV-238495r961086_rule
- SV-86297
Checks: C-41706r654817_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\publisher Criteria: If the value PromptForBadFiles is REG_DWORD = 0, this is not a finding.
Fix: F-41665r654818_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security "Prompt to allow fatally corrupt files to open instead of blocking them" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO323
- Vuln IDs
-
- V-238496
- V-71675
- Rule IDs
-
- SV-238496r961092_rule
- SV-86299
Checks: C-41707r654820_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security "Publisher Automation Security Level" is set to "Enabled and High (Disabled)" is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security Criteria: If the value AutomationSecurityPublisher is REG_DWORD = 3, this is not a finding.
Fix: F-41666r654821_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2016 -> Security "Publisher Automation Security Level" to "Enabled and High (Disabled)" is selected.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTO-Pub999
- Vuln IDs
-
- V-279948
- Rule IDs
-
- SV-279948r1156593_rule
Checks: C-84509r1156591_chk
Publisher 2016 is no longer supported by the vendor. If the system is running Publisher 2016, this is a finding.
Fix: F-84414r1156592_fix
Upgrade to a supported version.