Microsoft Word 2013 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Supporting documents 3 PDFs
Bundled by DISA alongside this STIG release: overview, revision history, and readme files. Download the full archive or open an individual PDF.
Digest of Updates +1 −1 ✎ 32
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-72829 Medium Macros must be blocked from running in Office 2013 files from the Internet.
Removed rules 1
- V-26625 Medium Word 2013 application must be prevented from loading any custom user interface (UI) code.
Content changes 32
- V-17173 Medium description Disabling of user name and password syntax from being used in URLs must be enforced.
- V-17174 Medium description The Internet Explorer Bind to Object functionality must be enabled.
- V-17175 Medium description The Saved from URL mark must be selected to enforce Internet zone processing.
- V-17183 Medium description Navigation to URLs embedded in Office products must be blocked.
- V-17184 Medium description Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-17187 Medium description Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-17471 Medium description All automatic loading from trusted locations must be disabled.
- V-17473 Medium description Force encrypted macros to be scanned in open XML documents must be determined and configured.
- V-17520 Medium description Disallowance of trusted locations on the network must be enforced.
- V-17521 Medium description The Save commands default file format must be configured.
- V-17522 Medium description Trust access for VBA must be disallowed.
- V-17545 Medium description Warning Bar settings for VBA macros must be configured.
- V-17813 Medium description A warning before printing that the document contains tracking changes must be provided.
- V-26584 Medium description Add-on Management functionality must be allowed.
- V-26585 Medium description Protection from zone elevation must be enforced.
- V-26586 Medium description ActiveX Installs must be configured for proper restriction.
- V-26587 Medium description File Downloads must be configured for proper restrictions.
- V-26588 Medium description Scripted Window Security must be enforced.
- V-26589 Medium description Add-ins to Office applications must be signed by a Trusted Publisher.
- V-26592 Medium description Configuration for file validation must be enforced.
- V-26612 Medium description Blocking as default file block opening behavior must be enforced.
- V-26614 Medium description Files from the Internet zone must be opened in Protected View.
- V-26615 Medium description Files in unsafe locations must be opened in Protected View.
- V-26616 Medium description Document behavior if file validation fails must be set.
- V-26617 Medium description Attachments opened from Outlook must be in Protected View.
- V-26648 Medium description Online translation dictionaries must not be used.
- V-26653 Medium description Word 2 and earlier binary documents and templates must be blocked for open/save.
- V-26654 Medium description Word 2000 binary documents and templates must be configured to edit in protected view.
- V-26656 Medium description Word 6.0 binary documents and templates must be configured for block open/save actions.
- V-26657 Medium description Word 95 binary documents and templates must be configured to edit in protected view.
- V-26658 Medium description Word 97 binary documents and templates must be configured to edit in protected view.
- V-26659 Medium description Word XP binary documents and templates must be configured to edit in protected view.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-53554r1_rule
Checks: C-47707r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and a check in the 'winword.exe' check box is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46478r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-53557r1_rule
Checks: C-47709r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and a check in the 'winword.exe' check box is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46481r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-53558r1_rule
Checks: C-47710r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and a check in the 'winword.exe' check box is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46482r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-53561r1_rule
Checks: C-47713r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and a check in the 'winword.exe' check box is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46485r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-53565r1_rule
Checks: C-47717r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46489r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select 'winword.exe'.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-53566r1_rule
Checks: C-47718r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-46490r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO133
- Vuln IDs
-
- V-17471
- Rule IDs
-
- SV-53571r1_rule
Checks: C-47720r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-46495r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO142
- Vuln IDs
-
- V-17473
- Rule IDs
-
- SV-53575r1_rule
Checks: C-47723r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Scan encrypted macros in Word Open XML documents" is set to "Enabled (Scan encrypted macros (default))". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security Criteria: If the value WordBypassEncryptedMacroScan is REG_DWORD = 0, this is not a finding.
Fix: F-46499r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Scan encrypted macros in Word Open XML documents" to "Enabled (Scan encrypted macros (default))".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO134
- Vuln IDs
-
- V-17520
- Rule IDs
-
- SV-53572r1_rule
Checks: C-47721r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\trusted locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-46497r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO139
- Vuln IDs
-
- V-17521
- Rule IDs
-
- SV-53574r1_rule
Checks: C-47722r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Save "default file format" is set to "Enabled Word Document (.docx)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\options Criteria: If the value DefaultFormat is REG_SZ = (blank), this is not a finding.
Fix: F-46498r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Save "default file format" to "Enabled Word Document (.docx)".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO146
- Vuln IDs
-
- V-17522
- Rule IDs
-
- SV-53576r1_rule
Checks: C-47724r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Trust access to Visual Basic Project" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security Criteria: If the value AccessVBOM is REG_DWORD = 0, this is not a finding.
Fix: F-46500r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Trust access to Visual Basic Project" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-17545
- Rule IDs
-
- SV-53586r2_rule
Checks: C-47733r2_chk
NOTE: If VBA support is not installed, this check is Not Applicable. Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "VBA Macro Notification Settings" is set to "Enabled (Disable all with notification)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-46510r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "VBA Macro Notification Settings" to "Enabled (Disable all with notification)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO302
- Vuln IDs
-
- V-17811
- Rule IDs
-
- SV-53584r1_rule
Checks: C-47731r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Advanced "Update automatic links at Open" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\options Criteria: If the value DontUpdateLinks is REG_DWORD = 1, this is not a finding.
Fix: F-46508r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Advanced "Update automatic links at Open" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO303
- Vuln IDs
-
- V-17813
- Rule IDs
-
- SV-53585r2_rule
Checks: C-47732r2_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security "Warn before printing, saving or sending a file that contains tracked changes or comments" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\options Criteria: If the value WarnRevisions is REG_DWORD = 1, this is not a finding
Fix: F-46509r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security "Warn before printing, saving or sending a file that contains tracked changes or comments" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-53563r1_rule
Checks: C-47715r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management " is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46487r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management " to "Enabled" and 'winword.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-53577r1_rule
Checks: C-47725r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46501r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'winword.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-53578r1_rule
Checks: C-47726r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46502r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'winword.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-53568r1_rule
Checks: C-47719r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46493r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and 'winword.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-26588
- Rule IDs
-
- SV-53562r1_rule
Checks: C-47714r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46486r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'winword.exe' is checked.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-26589
- Rule IDs
-
- SV-53564r1_rule
Checks: C-47716r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-46488r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO119
- Vuln IDs
-
- V-26592
- Rule IDs
-
- SV-53559r1_rule
Checks: C-47711r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security "Turn off file validation" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\filevalidation Criteria: If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-46483r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO110
- Vuln IDs
-
- V-26612
- Rule IDs
-
- SV-53555r1_rule
Checks: C-47708r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-46480r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO121
- Vuln IDs
-
- V-26614
- Rule IDs
-
- SV-53560r1_rule
Checks: C-47712r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\protectedview Criteria: If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix: F-46484r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO288
- Vuln IDs
-
- V-26615
- Rule IDs
-
- SV-53579r1_rule
Checks: C-47727r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\protectedview Criteria: If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-46503r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO292
- Vuln IDs
-
- V-26616
- Rule IDs
-
- SV-53581r1_rule
Checks: C-47729r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" is set to "Enabled: Open in Protected View" and Unchecked for "Do not allow edit". Procedure: Use the Windows Registry Editor to navigate to the following keys: If both HKCU\Software\Policies\Microsoft\Office\15.0\word\security\filevalidation\OpenInProtectedView is set to REG_DWORD = 1 and HKCU\Software\Policies\Microsoft\Office\15.0\word\security\filevalidation\DisableEditFromPV is set to REG_DWORD = 1, this is not a finding. If either, or both keys is not set to REG_DWORD = 1, this is a finding.
Fix: F-46506r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" to "Enabled: Open in Protected View" and Unchecked for "Do not allow edit".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO293
- Vuln IDs
-
- V-26617
- Rule IDs
-
- SV-53582r1_rule
Checks: C-47730r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following keys: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\protectedview Criteria: If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-46507r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO328
- Vuln IDs
-
- V-26648
- Rule IDs
-
- SV-53588r2_rule
Checks: C-47735r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Miscellaneous -> "Use online translation dictionaries" is set to Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\research\translation Criteria: If the value useonline is REG_DWORD = 0, this is not a finding.
Fix: F-46513r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Miscellaneous -> "Use online translation dictionaries" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO333
- Vuln IDs
-
- V-26653
- Rule IDs
-
- SV-53590r1_rule
Checks: C-47736r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2 and earlier binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix: F-46514r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2 and earlier binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO334
- Vuln IDs
-
- V-26654
- Rule IDs
-
- SV-53591r1_rule
Checks: C-47737r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2000 binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value Word2000Files is REG_DWORD = 5, this is not a finding.
Fix: F-46515r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2000 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO336
- Vuln IDs
-
- V-26656
- Rule IDs
-
- SV-53593r1_rule
Checks: C-47739r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 6.0 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value Word60Files is REG_DWORD = 2, this is not a finding.
Fix: F-46518r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 6.0 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO337
- Vuln IDs
-
- V-26657
- Rule IDs
-
- SV-53594r1_rule
Checks: C-47740r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 95 binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value Word95Files is REG_DWORD = 5, this is not a finding.
Fix: F-46519r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 95 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO338
- Vuln IDs
-
- V-26658
- Rule IDs
-
- SV-53595r1_rule
Checks: C-47741r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 97 binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value Word97Files is REG_DWORD = 5, this is not a finding.
Fix: F-46520r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 97 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO339
- Vuln IDs
-
- V-26659
- Rule IDs
-
- SV-55922r1_rule
Checks: C-47742r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word XP binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value WordXPFiles is REG_DWORD = 5, this is not a finding.
Fix: F-46522r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Word XP binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO426
- Vuln IDs
-
- V-41147
- Rule IDs
-
- SV-53598r1_rule
Checks: C-47743r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Advanced -> "Custom markup warning" is set to "Enabled: Prompt". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\options Criteria: If the value custommarkupwarning is REG_DWORD = 1, this is not a finding.
Fix: F-46523r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Advanced -> "Custom markup warning" to "Enabled: Prompt".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO600
- Vuln IDs
-
- V-72829
- Rule IDs
-
- SV-87481r1_rule
Checks: C-72963r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2013 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security If the value "blockcontentexecutionfrominternet" is REG_DWORD = 1, this is not a finding.
Fix: F-79281r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2013 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".