Microsoft Word 2010 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Supporting documents 3 PDFs
Bundled by DISA alongside this STIG release: overview, revision history, and readme files. Download the full archive or open an individual PDF.
Digest of Updates +36 −36
Comparison against the immediately-prior release (V1R8). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 36
- V-242277 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-242278 Medium Blocking as default file block opening behavior must be enforced.
- V-242279 Medium Enabling IE Bind to Object functionality must be present.
- V-242280 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-242281 Medium Configuration for file validation must be enforced.
- V-242282 Medium Files from the Internet zone must be opened in Protected View.
- V-242283 Medium Navigation to URL's embedded in Office products must be blocked.
- V-242284 Medium Scripted Window Security must be enforced.
- V-242285 Medium Add-on Management functionality must be allowed.
- V-242286 Medium Application add-ins must be signed by Trusted Publisher.
- V-242287 Medium Data Execution Prevention must be enforced.
- V-242288 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-242289 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-242290 Medium File Downloads must be configured for proper restrictions.
- V-242291 Medium All automatic loading from Trusted Locations must be disabled.
- V-242292 Medium Disallowance of Trusted Locations on the network must be enforced.
- V-242293 Medium Save files default format must be configured.
- V-242294 Medium Force encrypted macros to be scanned in open XML documents must be determined and configured.
- V-242295 Medium Trust access for VBA must be disallowed.
- V-242296 Medium Protection from zone elevation must be enforced.
- V-242297 Medium Pre-release versions of file formats new to Office Products must be blocked.
- V-242298 Medium ActiveX Installs must be configured for proper restriction.
- V-242299 Medium Files in unsafe locations must be opened in Protected View.
- V-242300 Medium Document behavior if file validation fails must be set.
- V-242301 Medium Attachments opened from Outlook must be in Protected View.
- V-242302 Medium The automatically update links feature must be configured as off.
- V-242303 Medium A warning before printing that the document contains tracking changes must be provided.
- V-242304 Medium Warning Bar settings for VBA macros must be configured.
- V-242305 Medium Online translation dictionaries must be in use.
- V-242306 Medium Word 2 and earlier binary documents and templates must be blocked for open/save.
- V-242307 Medium Word 2000 binary documents and templates must be configured to edit in protected view.
- V-242308 Medium Word 6.0 binary documents and templates must be configured for block open/save actions.
- V-242309 Medium Word 95 binary documents and templates must be configured to edit in protected view.
- V-242310 Medium Word 97 binary documents and templates must be configured to edit in protected view.
- V-242311 Medium Word XP binary documents and templates must be configured to edit in protected view.
- V-265901 High The version of Microsoft Word running on the system must be a supported version.
Removed rules 36
- V-17173 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-17174 Medium Enabling IE Bind to Object functionality must be present.
- V-17175 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-17183 Medium Navigation to URL's embedded in Office products must be blocked.
- V-17184 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-17187 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-17322 Medium Pre-release versions of file formats new to Office Products must be blocked.
- V-17471 Medium All automatic loading from Trusted Locations must be disabled.
- V-17473 Medium Force encrypted macros to be scanned in open XML documents must be determined and configured.
- V-17520 Medium Disallowance of Trusted Locations on the network must be enforced.
- V-17521 Medium Save files default format must be configured.
- V-17522 Medium Trust access for VBA must be disallowed.
- V-17545 Medium Warning Bar settings for VBA macros must be configured.
- V-17811 Medium The automatically update links feature must be configured as off.
- V-17813 Medium A warning before printing that the document contains tracking changes must be provided.
- V-26584 Medium Add-on Management functionality must be allowed.
- V-26585 Medium Protection from zone elevation must be enforced.
- V-26586 Medium ActiveX Installs must be configured for proper restriction.
- V-26587 Medium File Downloads must be configured for proper restrictions.
- V-26588 Medium Scripted Window Security must be enforced.
- V-26589 Medium Application add-ins must be signed by Trusted Publisher.
- V-26590 Medium Data Execution Prevention must be enforced.
- V-26592 Medium Configuration for file validation must be enforced.
- V-26612 Medium Blocking as default file block opening behavior must be enforced.
- V-26614 Medium Files from the Internet zone must be opened in Protected View.
- V-26615 Medium Files in unsafe locations must be opened in Protected View.
- V-26616 Medium Document behavior if file validation fails must be set.
- V-26617 Medium Attachments opened from Outlook must be in Protected View.
- V-26625 Medium Disable UI extending from documents and templates must be disallowed.
- V-26648 Medium Online translation dictionaries must be in use.
- V-26653 Medium Word 2 and earlier binary documents and templates must be blocked for open/save.
- V-26654 Medium Word 2000 binary documents and templates must be configured to edit in protected view.
- V-26656 Medium Word 6.0 binary documents and templates must be configured for block open/save actions.
- V-26657 Medium Word 95 binary documents and templates must be configured to edit in protected view.
- V-26658 Medium Word 97 binary documents and templates must be configured to edit in protected view.
- V-26659 Medium Word XP binary documents and templates must be configured to edit in protected view.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104 - Word
- Vuln IDs
-
- V-242277
- V-17173
- Rule IDs
-
- SV-242277r961092_rule
- SV-33407
Checks: C-45552r711121_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" must be "Enabled" and a check in the "winword.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45510r711122_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the "winword.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO110 - Word
- Vuln IDs
-
- V-242278
- V-26612
- Rule IDs
-
- SV-242278r961086_rule
- SV-33873
Checks: C-45553r711124_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" must be "Enabled: Blocked files are not opened". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-45511r711125_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111 - Word
- Vuln IDs
-
- V-242279
- V-17174
- Rule IDs
-
- SV-242279r960921_rule
- SV-33391
Checks: C-45554r711127_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the "winword.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45512r711128_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the "winword.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117 - Word
- Vuln IDs
-
- V-242280
- V-17175
- Rule IDs
-
- SV-242280r961092_rule
- SV-33418
Checks: C-45555r711130_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the "winword.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45513r711131_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the "winword.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO119 - Word
- Vuln IDs
-
- V-242281
- V-26592
- Rule IDs
-
- SV-242281r960921_rule
- SV-33875
Checks: C-45556r711133_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security "Turn off file validation" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\filevalidation Criteria: If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-45514r711134_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO121 - Word
- Vuln IDs
-
- V-242282
- V-26614
- Rule IDs
-
- SV-242282r961086_rule
- SV-33863
Checks: C-45557r711136_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\protectedview Criteria: If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix: F-45515r711137_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123 - Word
- Vuln IDs
-
- V-242283
- V-17183
- Rule IDs
-
- SV-242283r961092_rule
- SV-33415
Checks: C-45558r711139_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the "winword.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45516r711140_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the "winword.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124 - Word
- Vuln IDs
-
- V-242284
- V-26588
- Rule IDs
-
- SV-242284r960921_rule
- SV-33805
Checks: C-45559r711142_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" must be set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45517r711143_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and "winword.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126 - Word
- Vuln IDs
-
- V-242285
- V-26584
- Rule IDs
-
- SV-242285r961086_rule
- SV-33783
Checks: C-45560r711145_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management " must be set to "Enabled" and "winword.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45518r711146_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management " to "Enabled" and "winword.exe" is checked.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127 - Word
- Vuln IDs
-
- V-242286
- V-26589
- Rule IDs
-
- SV-242286r960954_rule
- SV-33853
Checks: C-45561r711148_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-45519r711149_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO128 - Word
- Vuln IDs
-
- V-242287
- V-26590
- Rule IDs
-
- SV-242287r961092_rule
- SV-33859
Checks: C-45562r711151_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Turn off Data Execution Prevention" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-45520r711152_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Turn off Data Execution Prevention" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129 - Word
- Vuln IDs
-
- V-242288
- V-17184
- Rule IDs
-
- SV-242288r961086_rule
- SV-33397
Checks: C-45563r711154_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and "winword.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45521r711155_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select "winword.exe".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131 - Word
- Vuln IDs
-
- V-242289
- V-17187
- Rule IDs
-
- SV-242289r960954_rule
- SV-33612
Checks: C-45564r711157_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-45522r711158_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132 - Word
- Vuln IDs
-
- V-242290
- V-26587
- Rule IDs
-
- SV-242290r961089_rule
- SV-33801
Checks: C-45565r711160_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" must be set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45523r711161_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and "winword.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO133 - Word
- Vuln IDs
-
- V-242291
- V-17471
- Rule IDs
-
- SV-242291r961092_rule
- SV-33624
Checks: C-45566r711163_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-45524r711164_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO134 - Word
- Vuln IDs
-
- V-242292
- V-17520
- Rule IDs
-
- SV-242292r961092_rule
- SV-33621
Checks: C-45567r711166_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\trusted locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-45525r711167_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO139 - Word
- Vuln IDs
-
- V-242293
- V-17521
- Rule IDs
-
- SV-242293r960963_rule
- SV-33610
Checks: C-45568r711169_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Save "default file format" must be set to "Enabled Word Document (.docx)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\options Criteria: If the value DefaultFormat is REG_SZ = (blank), this is not a finding.
Fix: F-45526r711170_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Save "default file format" to "Enabled Word Document (.docx)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO142 - Word
- Vuln IDs
-
- V-242294
- V-17473
- Rule IDs
-
- SV-242294r961092_rule
- SV-33613
Checks: C-45569r711172_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Scan encrypted macros in Word Open XML documents" must be "Enabled (Scan encrypted macros (default))". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value WordBypassEncryptedMacroScan is REG_DWORD = 0, this is not a finding.
Fix: F-45527r711173_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Scan encrypted macros in Word Open XML documents" to "Enabled (Scan encrypted macros (default))".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO146 - Word
- Vuln IDs
-
- V-242295
- V-17522
- Rule IDs
-
- SV-242295r960963_rule
- SV-33615
Checks: C-45570r711175_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Trust access to Visual Basic Project" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value AccessVBOM is REG_DWORD = 0, this is not a finding.
Fix: F-45528r711176_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "Trust access to Visual Basic Project" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209 - Word
- Vuln IDs
-
- V-242296
- V-26585
- Rule IDs
-
- SV-242296r960921_rule
- SV-33789
Checks: C-45571r711178_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" must be set to "Enabled" and "winword.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45529r711179_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and "winword.exe" is checked.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- DTOO210 - Word
- Vuln IDs
-
- V-242297
- V-17322
- Rule IDs
-
- SV-242297r961473_rule
- SV-33450
Checks: C-45572r711181_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Office 2010 Converters "Block opening of pre-release versions of file formats new to Word 2010 through the Compatibility Pack for Office 2010 and Word 2010 Open XML/Word 97-2003 Format Converter" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word12BetaFilesFromConverters is REG_DWORD = 1, this is not a finding.
Fix: F-45530r711226_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Office 2010 Converters "Block opening of pre-release versions of file formats new to Word 2010 through the Compatibility Pack for Office 2010 and Word 2010 Open XML/Word 97-2003 Format Converter" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211 - Word
- Vuln IDs
-
- V-242298
- V-26586
- Rule IDs
-
- SV-242298r961779_rule
- SV-33795
Checks: C-45573r711184_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" must be set to "Enabled" and "winword.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45531r711185_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and "winword.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO288 - Word
- Vuln IDs
-
- V-242299
- V-26615
- Rule IDs
-
- SV-242299r961092_rule
- SV-33865
Checks: C-45574r711187_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\protectedview Criteria: If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-45532r711188_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO292 - Word
- Vuln IDs
-
- V-242300
- V-26616
- Rule IDs
-
- SV-242300r961092_rule
- SV-33868
Checks: C-45575r711190_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" must be "Enabled: Open in Protected View" and Unchecked for "Do not allow edit". Procedure: Use the Windows Registry Editor to navigate to the following keys: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\filevalidation Criteria: If the value OpenInProtectedView is REG_DWORD = 1, this is not a finding. AND HKCU\Software\Policies\Microsoft\Office\14.0\word\security\filevalidation Criteria: If the value DisableEditFromPV is REG_DWORD = 1, this is not a finding.
Fix: F-45533r711228_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" to "Enabled: Open in Protected View" and Unchecked for "Do not allow edit".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO293 - Word
- Vuln IDs
-
- V-242301
- V-26617
- Rule IDs
-
- SV-242301r961092_rule
- SV-33871
Checks: C-45576r711193_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following keys: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\protectedview Criteria: If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-45534r711194_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO302 - Word
- Vuln IDs
-
- V-242302
- V-17811
- Rule IDs
-
- SV-242302r961092_rule
- SV-33609
Checks: C-45577r711196_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Advanced "Update automatic links at Open" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\options Criteria: If the value DontUpdateLinks is REG_DWORD = 1 this is not a finding.
Fix: F-45535r711197_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Advanced "Update automatic links at Open" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO303 - Word
- Vuln IDs
-
- V-242303
- V-17813
- Rule IDs
-
- SV-242303r961863_rule
- SV-33611
Checks: C-45578r711199_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security "Warn before printing, saving or sending a file that contains tracked changes or comments" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\options\vpref Criteria: If the value fWarnRevisions_1125_1 is REG_DWORD = 1 this is not a finding.
Fix: F-45536r711200_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security "Warn before printing, saving or sending a file that contains tracked changes or comments" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304 - Word
- Vuln IDs
-
- V-242304
- V-17545
- Rule IDs
-
- SV-242304r960963_rule
- SV-33619
Checks: C-45579r711202_chk
NOTE: If VBA support is not installed, this check is Not Applicable. The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "VBA Macro Notification Settings" must be "Enabled (Disable all with notification)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-45537r711203_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center "VBA Macro Notification Settings" to "Enabled (Disable all with notification)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO328 - Word
- Vuln IDs
-
- V-242305
- V-26648
- Rule IDs
-
- SV-242305r961092_rule
- SV-34094
Checks: C-45580r711205_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Miscellaneous "Use online translation dictionaries" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\research\translation Criteria: If the value UseOnline is REG_DWORD = 1, this is not a finding.
Fix: F-45538r711206_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Miscellaneous "Use online translation dictionaries" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO333 - Word
- Vuln IDs
-
- V-242306
- V-26653
- Rule IDs
-
- SV-242306r961086_rule
- SV-34095
Checks: C-45581r711208_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2 and earlier binary documents and templates" must be "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix: F-45539r711230_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2 and earlier binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO334 - Word
- Vuln IDs
-
- V-242307
- V-26654
- Rule IDs
-
- SV-242307r961086_rule
- SV-34096
Checks: C-45582r711211_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2000 binary documents and templates" must be "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word2000Files is REG_DWORD = 5, this is not a finding.
Fix: F-45540r711232_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2000 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO336 - Word
- Vuln IDs
-
- V-242308
- V-26656
- Rule IDs
-
- SV-242308r961086_rule
- SV-34097
Checks: C-45583r711214_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 6.0 binary documents and templates" must be "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word60Files is REG_DWORD = 2, this is not a finding.
Fix: F-45541r711215_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 6.0 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO337 - Word
- Vuln IDs
-
- V-242309
- V-26657
- Rule IDs
-
- SV-242309r961086_rule
- SV-34098
Checks: C-45584r711217_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 95 binary documents and templates" must be "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word95Files is REG_DWORD = 5, this is not a finding.
Fix: F-45542r711234_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 95 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO338 - Word
- Vuln IDs
-
- V-242310
- V-26658
- Rule IDs
-
- SV-242310r961086_rule
- SV-34099
Checks: C-45585r711220_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 97 binary documents and templates" must be "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word97Files is REG_DWORD = 5, this is not a finding.
Fix: F-45543r711236_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 97 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO339 - Word
- Vuln IDs
-
- V-242311
- V-26659
- Rule IDs
-
- SV-242311r961086_rule
- SV-34100
Checks: C-45586r711223_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word XP binary documents and templates" must be "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value WordXPFiles is REG_DWORD = 5, this is not a finding.
Fix: F-45544r711238_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings "Word XP binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO999 - Word
- Vuln IDs
-
- V-265901
- Rule IDs
-
- SV-265901r999907_rule
Checks: C-69820r999905_chk
Microsoft Word 2010 is no longer supported by the vendor. If the system is running Microsoft Word 2010, this is a finding.
Fix: F-69724r999906_fix
Upgrade to a supported version.