Microsoft Word 2007
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 5
Comparison against the immediately-prior release (V4R13). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 5
- V-17173 Medium descriptioncheckfix Disable user name and password for Word.
- V-17174 Medium descriptioncheckfix Enable IE Bind to Object functionality for instances of IE launched from Word.
- V-17175 Medium descriptioncheckfix Saved from URL - Word
- V-17183 Medium descriptioncheckfix Block navigation to URL embedded in Office products to protect against attack by malformed URL.
- V-17184 Medium descriptioncheckfix Block pop-ups for links that invoke instances of IE from within Word.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - Word
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-18180r2_rule
Checks: C-17854r4_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Disable user name and password” is set to “Enabled” and "winword.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16957r4_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Disable user name and password” to “Enabled” and select the "winword.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - Word
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-18187r2_rule
Checks: C-17865r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” is set to “Enabled” and the "winword.exe" check box checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16963r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Bind to Object” to “Enabled” and select the "winword.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - Word
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-18202r2_rule
Checks: C-17885r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” is set to “Enabled” and "winword.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17049r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Saved from URL” to “Enabled” and select the "winword.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - Word
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-18604r2_rule
Checks: C-18846r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” is set to “Enabled” and "winword.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17446r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Navigate URL” to “Enabled” and select the "winword.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - Word
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-18212r2_rule
Checks: C-17896r3_chk
Validate the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” is set to “Enabled” and "winword.exe" check box is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17057r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2007 system (Machine) >> Security Settings >> IE Security “Block popups” to “Enabled” and select the "winword.exe" check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131 - Word
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-18223r1_rule
Checks: C-17916r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-17083r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO210 - Word
- Vuln IDs
-
- V-17322
- Rule IDs
-
- SV-18564r1_rule
Checks: C-18829r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Office 2007 Converters “Block opening of pre-release versions of file formats new to Word 2007 through the Compatibility Pack for the 2007 Office system and Word 2007 Open XML/Word 97-2003 Format Converter” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security\FileOpenBlock Criteria: If the value Word12BetaFilesFromConverters is REG_DWORD = 1, this is not a finding.
Fix: F-17427r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Office 2007 Converters “Block opening of pre-release versions of file formats new to Word 2007 through the Compatibility Pack for the 2007 Office system and Word 2007 Open XML/Word 97-2003 Format Converter” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO133 - Word
- Vuln IDs
-
- V-17471
- Rule IDs
-
- SV-18531r1_rule
Checks: C-18820r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center -> Trusted Locations “Disable all trusted locations” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security\Trusted Locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-17412r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center -> Trusted Locations “Disable all trusted locations” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO142 - Word
- Vuln IDs
-
- V-17473
- Rule IDs
-
- SV-18536r1_rule
Checks: C-18823r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “Determine whether to force encrypted macros to be scanned in Microsoft Word Open XML documents” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security Criteria: If the value WordBypassEncryptedMacroScan is REG_DWORD = 1, this is not a finding.
Fix: F-17415r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “Determine whether to force encrypted macros to be scanned in Microsoft Word Open XML documents” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO155 - Word
- Vuln IDs
-
- V-17503
- Rule IDs
-
- SV-18576r1_rule
Checks: C-18832r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Block file formats -> Save “Block saving of Open XML file types” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security\FileSaveBlock Criteria: If the value OpenXmlFiles is REG_DWORD = 0, this is not a finding.
Fix: F-17430r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Block file formats -> Save “Block saving of Open XML file types” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO153 - Word
- Vuln IDs
-
- V-17518
- Rule IDs
-
- SV-18591r1_rule
Checks: C-18835r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Block file formats -> Open “Block opening of pre-release versions of file formats new to Word 2007” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security\FileOpenBlock Criteria: If the value Word12BetaFiles is REG_DWORD = 1, this is not a finding.
Fix: F-17435r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Block file formats -> Open “Block opening of pre-release versions of file formats new to Word 2007” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO154 - Word
- Vuln IDs
-
- V-17519
- Rule IDs
-
- SV-18593r1_rule
Checks: C-18836r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Block file formats -> Open “Block opening of Open XML file types” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security\FileOpenBlock Criteria: If the value OpenXmlFiles is REG_DWORD = 0, this is not a finding.
Fix: F-17436r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Block file formats -> Open “Block opening of Open XML file types” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO134 - Word
- Vuln IDs
-
- V-17520
- Rule IDs
-
- SV-18600r1_rule
Checks: C-18842r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations not on the computer” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security\Trusted Locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding
Fix: F-17442r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations not on the computer” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO139 - Word
- Vuln IDs
-
- V-17521
- Rule IDs
-
- SV-18608r1_rule
Checks: C-18849r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Save "save files in this format" will be set to “Enabled (Word 97 - 2003 Document (*.doc)) or "Enabled (Word Document (.docx))”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Options Criteria: If the value DefaultFormat is REG_SZ = doc for Word 97 - 2003 .doc or If the value DefaultFormat is REG_SZ = (blank) for Word 2007 .docx, this is not a finding.
Fix: F-17449r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Save “save files in this format” will be set to “Enabled (Word 97 - 2003 Document (*.doc)) or "Enabled (Word Document (.docx))”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO146 - Word
- Vuln IDs
-
- V-17522
- Rule IDs
-
- SV-18612r1_rule
Checks: C-18852r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “Trust access to Visual Basic Project” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security Criteria: If the value AccessVBOM is REG_DWORD = 0, this is not a finding.
Fix: F-17452r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “Trust access to Visual Basic Project” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO304 - Word
- Vuln IDs
-
- V-17545
- Rule IDs
-
- SV-18636r2_rule
Checks: C-18853r2_chk
NOTE: If VBA support is not installed, this check is Not Applicable. The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “VBA Macro Warning Settings” will be set to “Enabled (Trust Bar warning for all macros)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-17464r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security -> Trust Center “VBA Macro Warning Settings” will be set to “Enabled (Trust Bar warning for all macros)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO302 - Word
- Vuln IDs
-
- V-17811
- Rule IDs
-
- SV-19048r1_rule
Checks: C-19090r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Advanced “Update automatic links at Open” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Options\vpref Criteria: If the value fNoCalcLinksOnOpen_90_1 is REG_DWORD = 1 this is not a finding.
Fix: F-17712r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Advanced “Update automatic links at Open” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO303 - Word
- Vuln IDs
-
- V-17813
- Rule IDs
-
- SV-19052r1_rule
Checks: C-19097r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security “Warn before printing, saving or sending a file that contains tracked changes or comments” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Word\Options\vpref Criteria: If the value fWarnRevisions_1805_1 is REG_DWORD = 1 this is not a finding.
Fix: F-17714r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Word 2007 -> Word Options -> Security “Warn before printing, saving or sending a file that contains tracked changes or comments” will be set to “Enabled”.