Microsoft Visio 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +14 −13
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 14
- V-238108 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-238109 Medium Enabling IE Bind to Object functionality must be present.
- V-238110 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-238111 Medium Navigation to URLs embedded in Office products must be blocked.
- V-238112 Medium Scripted Window Security must be enforced.
- V-238113 Medium Add-on Management functionality must be allowed.
- V-238114 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-238115 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-238116 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-238117 Medium File Downloads must be configured for proper restrictions.
- V-238118 Medium Protection from zone elevation must be enforced.
- V-238119 Medium ActiveX Installs must be configured for proper restriction.
- V-238120 Medium Warning Bar settings for VBA macros must be configured.
- V-279950 High The version of Visio running on the system must be a supported version.
Removed rules 13
- V-70803 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-70805 Medium Enabling IE Bind to Object functionality must be present.
- V-70807 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-70809 Medium Navigation to URLs embedded in Office products must be blocked.
- V-70811 Medium Scripted Window Security must be enforced.
- V-70813 Medium Add-on Management functionality must be allowed.
- V-70815 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-70817 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-70819 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-70821 Medium File Downloads must be configured for proper restrictions.
- V-70823 Medium Protection from zone elevation must be enforced.
- V-70825 Medium ActiveX Installs must be configured for proper restriction.
- V-70827 Medium Warning Bar settings for VBA macros must be configured.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-238108
- V-70803
- Rule IDs
-
- SV-238108r961092_rule
- SV-85427
Checks: C-41318r651564_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41277r651565_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-238109
- V-70805
- Rule IDs
-
- SV-238109r960921_rule
- SV-85429
Checks: C-41319r651567_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41278r651568_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-238110
- V-70807
- Rule IDs
-
- SV-238110r961092_rule
- SV-85431
Checks: C-41320r651570_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41279r651571_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-238111
- V-70809
- Rule IDs
-
- SV-238111r961092_rule
- SV-85433
Checks: C-41321r651573_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41280r651574_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-238112
- V-70811
- Rule IDs
-
- SV-238112r960921_rule
- SV-85435
Checks: C-41322r651576_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41281r651577_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-238113
- V-70813
- Rule IDs
-
- SV-238113r961086_rule
- SV-85437
Checks: C-41323r651579_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41282r651580_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-238114
- V-70815
- Rule IDs
-
- SV-238114r960954_rule
- SV-85439
Checks: C-41324r651582_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2016 -> Visio Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\Visio\security Criteria: If the value requireaddinsig is REG_DWORD = 1, this is not a finding.
Fix: F-41283r651583_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2016 -> Visio Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-238115
- V-70817
- Rule IDs
-
- SV-238115r961086_rule
- SV-85441
Checks: C-41325r651585_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41284r651586_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-238116
- V-70819
- Rule IDs
-
- SV-238116r960954_rule
- SV-85443
Checks: C-41326r651588_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2016 -> Visio Options -> Security -> Trust Center -> "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\Visio\security Criteria: If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-41285r651589_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2016 -> Visio Options -> Security -> Trust Center -> "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-238117
- V-70821
- Rule IDs
-
- SV-238117r961089_rule
- SV-85445
Checks: C-41327r651591_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41286r651592_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-238118
- V-70823
- Rule IDs
-
- SV-238118r960921_rule
- SV-85447
Checks: C-41328r651594_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41287r651595_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-238119
- V-70825
- Rule IDs
-
- SV-238119r961779_rule
- SV-85449
Checks: C-41329r651597_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'visio.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value visio.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41288r651598_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'visio.exe' check box.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-238120
- V-70827
- Rule IDs
-
- SV-238120r960963_rule
- SV-85451
Checks: C-41330r651600_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2016 -> Visio Options -> Security -> Trust Center "VBA Macro Notification Settings" is set to "Enabled: Disable all with notification". The options 'Enabled: Disable all except digitally signed macros' and 'Enabled: Disable all without notification' are more restrictive and also acceptable values. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding. Values of REG_DWORD = 3 or 4 are also acceptable values. If the registry key does not exist or the value is REG_DWORD = 1, then this is a finding.
Fix: F-41289r651601_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2016 -> Visio Options -> Security -> Trust Center -> "VBA Macro Notification Settings" to "Enabled: Disable all with notification".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTO-Vis999
- Vuln IDs
-
- V-279950
- Rule IDs
-
- SV-279950r1156599_rule
Checks: C-84511r1156597_chk
Visio 2016 is no longer supported by the vendor. If the system is running Visio 2016, this is a finding.
Fix: F-84416r1156598_fix
Upgrade to a supported version.