Microsoft Visio 2013 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-242814
- V-40730
- Rule IDs
-
- SV-242814r961092_rule
- SV-52788
Checks: C-46089r716526_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" is "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46046r716527_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place check in 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-242815
- V-40731
- Rule IDs
-
- SV-242815r960921_rule
- SV-52789
Checks: C-46090r716529_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to object" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46047r716530_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to object" to "Enabled" and place check in 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-242816
- V-40732
- Rule IDs
-
- SV-242816r961092_rule
- SV-52790
Checks: C-46091r716532_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" is "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46048r716533_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place check in 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-242817
- V-40733
- Rule IDs
-
- SV-242817r961092_rule
- SV-52791
Checks: C-46092r716535_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" is "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46049r716536_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and 'visio.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-242818
- V-40734
- Rule IDs
-
- SV-242818r960921_rule
- SV-52792
Checks: C-46093r716538_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46050r716539_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'visio.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-242819
- V-40735
- Rule IDs
-
- SV-242819r961086_rule
- SV-52793
Checks: C-46094r716541_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\software\Microsoft\internet explorer\main\featurecontrol\feature_addon_management Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46051r716542_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place check in 'visio.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-242820
- V-40736
- Rule IDs
-
- SV-242820r960954_rule
- SV-52794
Checks: C-46095r716544_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\Visio\security Criteria: If the value requireaddinsig is REG_DWORD = 1, this is not a finding.
Fix: F-46052r716545_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-242821
- V-40737
- Rule IDs
-
- SV-242821r961086_rule
- SV-52795
Checks: C-46096r716547_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" is "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46053r716548_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place check in 'visio.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-242822
- V-40738
- Rule IDs
-
- SV-242822r960954_rule
- SV-52796
Checks: C-46097r716550_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\Visio\security Criteria: If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-46054r716551_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-242823
- V-40739
- Rule IDs
-
- SV-242823r961089_rule
- SV-52797
Checks: C-46098r716553_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'Visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46055r716554_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and 'visio.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-242824
- V-40740
- Rule IDs
-
- SV-242824r960921_rule
- SV-52798
Checks: C-46099r716556_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46056r716557_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'visio.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-242825
- V-40741
- Rule IDs
-
- SV-242825r961779_rule
- SV-52799
Checks: C-46100r716559_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46057r716560_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'visio.exe' is checked.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-242826
- V-40742
- Rule IDs
-
- SV-242826r960963_rule
- SV-52800
Checks: C-46101r716562_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "VBA Macro Notification Settings" is set to "Enabled: Disable all with notification". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\Visio\security Criteria: If the value vbawarnings is REG_DWORD = 2, this is not a finding.
Fix: F-46058r716563_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "VBA Macro Notification Settings" to "Enabled: Disable all with notification".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO999-Visio13
- Vuln IDs
-
- V-265900
- Rule IDs
-
- SV-265900r999904_rule
Checks: C-69819r999902_chk
Visio 2013 is no longer supported by the vendor. If the system is running Visio 2013, this is a finding.
Fix: F-69723r999903_fix
Upgrade to a supported version.