Microsoft Word 2010
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R9). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 36 rules matched cleanly.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - Word
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-33407r1_rule
Checks: C-33891r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” must be “Enabled” and a check in the ‘winword.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29580r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” to “Enabled” and place a check in the ‘winword.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - Word
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-33391r1_rule
Checks: C-33875r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” must be “Enabled” and a check in the ‘winword.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29564r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” to “Enabled” and place a check in the ‘winword.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - Word
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-33418r1_rule
Checks: C-33901r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” must be “Enabled” and a check in the ‘winword.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29590r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” to “Enabled” and place a check in the ‘winword.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - Word
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-33415r1_rule
Checks: C-33898r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” must be “Enabled” and a check in the ‘winword.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29587r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” to “Enabled” and place a check in the ‘winword.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - Word
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-33397r1_rule
Checks: C-33880r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” must be “Enabled” and ‘winword.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29569r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” to “Enabled” and select 'winword.exe’.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131 - Word
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-33612r1_rule
Checks: C-34078r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins and block them” must be “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-29754r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins and block them” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO210 - Word
- Vuln IDs
-
- V-17322
- Rule IDs
-
- SV-33450r1_rule
Checks: C-33933r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Office 2010 Converters “Block opening of pre-release versions of file formats new to Word 2010 through the Compatibility Pack for Office 2010 and Word 2010 Open XML/Word 97-2003 Format Converter” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word12BetaFilesFromConverters is REG_DWORD = 1, this is not a finding.
Fix: F-29622r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Office 2010 Converters “Block opening of pre-release versions of file formats new to Word 2010 through the Compatibility Pack for Office 2010 and Word 2010 Open XML/Word 97-2003 Format Converter” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO133 - Word
- Vuln IDs
-
- V-17471
- Rule IDs
-
- SV-33624r1_rule
Checks: C-34089r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations “Disable all trusted locations” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-29766r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations “Disable all trusted locations” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO142 - Word
- Vuln IDs
-
- V-17473
- Rule IDs
-
- SV-33613r1_rule
Checks: C-34079r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Scan encrypted macros in Word Open XML documents” must be “Enabled (Scan encrypted macros (default))”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value WordBypassEncryptedMacroScan is REG_DWORD = 0, this is not a finding.
Fix: F-29755r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Scan encrypted macros in Word Open XML documents” to “Enabled (Scan encrypted macros (default))”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO134 - Word
- Vuln IDs
-
- V-17520
- Rule IDs
-
- SV-33621r1_rule
Checks: C-34086r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations on the network” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\trusted locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-29764r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations on the network” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO139 - Word
- Vuln IDs
-
- V-17521
- Rule IDs
-
- SV-33610r1_rule
Checks: C-34076r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Save "default file format" must be set to "Enabled Word Document (.docx)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\options Criteria: If the value DefaultFormat is REG_SZ = (blank), this is not a finding.
Fix: F-29752r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Save "default file format" to "Enabled Word Document (.docx)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO146 - Word
- Vuln IDs
-
- V-17522
- Rule IDs
-
- SV-33615r1_rule
Checks: C-34081r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Trust access to Visual Basic Project” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value AccessVBOM is REG_DWORD = 0, this is not a finding.
Fix: F-29758r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Trust access to Visual Basic Project” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO304 - Word
- Vuln IDs
-
- V-17545
- Rule IDs
-
- SV-33619r2_rule
Checks: C-34084r2_chk
NOTE: If VBA support is not installed, this check is Not Applicable. The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “VBA Macro Notification Settings” must be “Enabled (Disable all with notification)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-29761r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “VBA Macro Notification Settings” to “Enabled (Disable all with notification)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO302 - Word
- Vuln IDs
-
- V-17811
- Rule IDs
-
- SV-33609r1_rule
Checks: C-34075r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Advanced “Update automatic links at Open” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\options Criteria: If the value DontUpdateLinks is REG_DWORD = 1 this is not a finding.
Fix: F-29751r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Advanced “Update automatic links at Open” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO303 - Word
- Vuln IDs
-
- V-17813
- Rule IDs
-
- SV-33611r1_rule
Checks: C-34077r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security “Warn before printing, saving or sending a file that contains tracked changes or comments” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\options\vpref Criteria: If the value fWarnRevisions_1125_1 is REG_DWORD = 1 this is not a finding.
Fix: F-29753r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security “Warn before printing, saving or sending a file that contains tracked changes or comments” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO126 - Word
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-33783r1_rule
Checks: C-34159r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management ” must be set to “Enabled” and ‘winword.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29848r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management ” to “Enabled” and ‘winword.exe’ is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209 - Word
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-33789r1_rule
Checks: C-34165r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” must be set to “Enabled” and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29854r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” to “Enabled” and 'winword.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO211 - Word
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-33795r1_rule
Checks: C-34170r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” must be set to “Enabled” and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29859r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” to “Enabled” and 'winword.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO132 - Word
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-33801r1_rule
Checks: C-34175r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” must be set to “Enabled” and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29864r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” to “Enabled” and 'winword.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO124 - Word
- Vuln IDs
-
- V-26588
- Rule IDs
-
- SV-33805r1_rule
Checks: C-34179r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” must be set to “Enabled” and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29868r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” to “Enabled” and 'winword.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO127 - Word
- Vuln IDs
-
- V-26589
- Rule IDs
-
- SV-33853r1_rule
Checks: C-34250r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Require that application add-ins are signed by Trusted Publisher” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-29944r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Require that application add-ins are signed by Trusted Publisher” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO128 - Word
- Vuln IDs
-
- V-26590
- Rule IDs
-
- SV-33859r1_rule
Checks: C-34251r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Turn off Data Execution Prevention” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-29945r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center “Turn off Data Execution Prevention” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO119 - Word
- Vuln IDs
-
- V-26592
- Rule IDs
-
- SV-33875r1_rule
Checks: C-34249r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security “Turn off file validation” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\filevalidation Criteria: If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-29943r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security “Turn off file validation” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO110 - Word
- Vuln IDs
-
- V-26612
- Rule IDs
-
- SV-33873r1_rule
Checks: C-34252r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Set default file block behavior” must be “Enabled: Blocked files are not opened”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-29946r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Set default file block behavior” to “Enabled: Blocked files are not opened”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO121 - Word
- Vuln IDs
-
- V-26614
- Rule IDs
-
- SV-33863r1_rule
Checks: C-34260r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Do not open files from the Internet zone in Protected View” must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\protectedview Criteria: If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix: F-29953r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Do not open files from the Internet zone in Protected View” to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO288 - Word
- Vuln IDs
-
- V-26615
- Rule IDs
-
- SV-33865r1_rule
Checks: C-34263r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Do not open files in unsafe locations in Protected View” must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\protectedview Criteria: If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-29954r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Do not open files in unsafe locations in Protected View” to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO292 - Word
- Vuln IDs
-
- V-26616
- Rule IDs
-
- SV-33868r1_rule
Checks: C-34266r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Set document behavior if file validation fails” must be "Enabled: Open in Protected View" and Unchecked for "Do not allow edit". Procedure: Use the Windows Registry Editor to navigate to the following keys: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\filevalidation Criteria: If the value OpenInProtectedView is REG_DWORD = 1, this is not a finding. AND HKCU\Software\Policies\Microsoft\Office\14.0\word\security\filevalidation Criteria: If the value DisableEditFromPV is REG_DWORD = 1, this is not a finding.
Fix: F-29955r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Set document behavior if file validation fails” to "Enabled: Open in Protected View" and Unchecked for "Do not allow edit".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO293 - Word
- Vuln IDs
-
- V-26617
- Rule IDs
-
- SV-33871r1_rule
Checks: C-34267r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Turn off Protected View for attachments opened from Outlook” must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following keys: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\protectedview Criteria: If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-29956r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> Protected View “Turn off Protected View for attachments opened from Outlook” to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO305 - Word
- Vuln IDs
-
- V-26625
- Rule IDs
-
- SV-33812r1_rule
Checks: C-34186r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” must be “Enabled" and "Disallow in Word" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\toolbars\word Criteria: If the value NoExtensibilityCustomizationFromDocument is REG_DWORD = 1, this is not a finding.
Fix: F-29875r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” to “Enabled" and select "Disallow in Word".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO328 - Word
- Vuln IDs
-
- V-26648
- Rule IDs
-
- SV-34094r1_rule
Checks: C-34248r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Miscellaneous “Use online translation dictionaries” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\research\translation Criteria: If the value UseOnline is REG_DWORD = 1, this is not a finding.
Fix: F-29942r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Miscellaneous “Use online translation dictionaries” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO333 - Word
- Vuln IDs
-
- V-26653
- Rule IDs
-
- SV-34095r1_rule
Checks: C-34253r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 2 and earlier binary documents and templates” must be “Enabled: Open/Save blocked, use open policy”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix: F-29947r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 2 and earlier binary documents and templates” to “Enabled: Open/Save blocked, use open policy”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO334 - Word
- Vuln IDs
-
- V-26654
- Rule IDs
-
- SV-34096r2_rule
Checks: C-34254r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 2000 binary documents and templates” must be “Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word2000Files is REG_DWORD = 5, this is not a finding.
Fix: F-29948r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 2000 binary documents and templates” to “Enabled: Allow editing and open in Protected View".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO336 - Word
- Vuln IDs
-
- V-26656
- Rule IDs
-
- SV-34097r1_rule
Checks: C-34255r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 6.0 binary documents and templates” must be “Enabled: Open/Save blocked, use open policy”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word60Files is REG_DWORD = 2, this is not a finding.
Fix: F-29949r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 6.0 binary documents and templates” to “Enabled: Open/Save blocked, use open policy”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO337 - Word
- Vuln IDs
-
- V-26657
- Rule IDs
-
- SV-34098r2_rule
Checks: C-34256r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 95 binary documents and templates” must be “Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word95Files is REG_DWORD = 5, this is not a finding.
Fix: F-29950r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 95 binary documents and templates” to “Enabled: Allow editing and open in Protected View".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO338 - Word
- Vuln IDs
-
- V-26658
- Rule IDs
-
- SV-34099r2_rule
Checks: C-34257r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 97 binary documents and templates” must be “Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value Word97Files is REG_DWORD = 5, this is not a finding.
Fix: F-29951r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word 97 binary documents and templates” to “Enabled: Allow editing and open in Protected View".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO339 - Word
- Vuln IDs
-
- V-26659
- Rule IDs
-
- SV-34100r2_rule
Checks: C-34259r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word XP binary documents and templates” must be “Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock Criteria: If the value WordXPFiles is REG_DWORD = 5, this is not a finding.
Fix: F-29952r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Word XP binary documents and templates” to “Enabled: Allow editing and open in Protected View".