Microsoft Word 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +35 −34
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 35
- V-238121 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-238122 Medium Blocking as default file block opening behavior must be enforced.
- V-238123 Medium The Internet Explorer Bind to Object functionality must be enabled.
- V-238124 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-238125 Medium Configuration for file validation must be enforced.
- V-238126 Medium Files from the Internet zone must be opened in Protected View.
- V-238127 Medium Navigation to URLs embedded in Office products must be blocked.
- V-238128 Medium Scripted Window Security must be enforced.
- V-238129 Medium Add-on Management functionality must be allowed.
- V-238130 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-238131 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-238132 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-238133 Medium File Downloads must be configured for proper restrictions.
- V-238134 Medium All automatic loading from trusted locations must be disabled.
- V-238135 Medium Disallowance of trusted locations on the network must be enforced.
- V-238136 Medium The Save commands default file format must be configured.
- V-238137 Medium Force encrypted macros to be scanned in open XML documents must be determined and configured.
- V-238138 Medium Trust access for VBA must be disallowed.
- V-238139 Medium Protection from zone elevation must be enforced.
- V-238140 Medium ActiveX Installs must be configured for proper restriction.
- V-238141 Medium Files in unsafe locations must be opened in Protected View.
- V-238142 Medium Document behavior if file validation fails must be set.
- V-238143 Medium Attachments opened from Outlook must be in Protected View.
- V-238144 Medium The automatically update links feature must be disabled.
- V-238145 Medium Warning Bar settings for VBA macros must be configured.
- V-238146 Medium Online translation dictionaries must not be used.
- V-238147 Medium Word 2 and earlier binary documents and templates must be blocked for open/save.
- V-238148 Medium Word 2000 binary documents and templates must be configured to edit in protected view.
- V-238149 Medium Word 6.0 binary documents and templates must be configured for block open/save actions.
- V-238150 Medium Word 95 binary documents and templates must be configured to edit in protected view.
- V-238151 Medium Word 97 binary documents and templates must be configured to edit in protected view.
- V-238152 Medium Word XP binary documents and templates must be configured to edit in protected view.
- V-238153 Medium Macros must be blocked from running in Office files from the Internet.
- V-238154 Medium Files on local Intranet UNC must be opened in Protected View.
- V-279951 High The version of Word running on the system must be a supported version.
Removed rules 34
- V-71041 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-71043 Medium Blocking as default file block opening behavior must be enforced.
- V-71045 Medium The Internet Explorer Bind to Object functionality must be enabled.
- V-71047 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-71049 Medium Configuration for file validation must be enforced.
- V-71051 Medium Files from the Internet zone must be opened in Protected View.
- V-71053 Medium Navigation to URLs embedded in Office products must be blocked.
- V-71055 Medium Scripted Window Security must be enforced.
- V-71057 Medium Add-on Management functionality must be allowed.
- V-71059 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
- V-71061 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-71063 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
- V-71065 Medium File Downloads must be configured for proper restrictions.
- V-71067 Medium All automatic loading from trusted locations must be disabled.
- V-71069 Medium Disallowance of trusted locations on the network must be enforced.
- V-71071 Medium The Save commands default file format must be configured.
- V-71073 Medium Force encrypted macros to be scanned in open XML documents must be determined and configured.
- V-71075 Medium Trust access for VBA must be disallowed.
- V-71077 Medium Protection from zone elevation must be enforced.
- V-71079 Medium ActiveX Installs must be configured for proper restriction.
- V-71081 Medium Files in unsafe locations must be opened in Protected View.
- V-71083 Medium Document behavior if file validation fails must be set.
- V-71085 Medium Attachments opened from Outlook must be in Protected View.
- V-71087 Medium The automatically update links feature must be disabled.
- V-71089 Medium Warning Bar settings for VBA macros must be configured.
- V-71091 Medium Online translation dictionaries must not be used.
- V-71093 Medium Word 2 and earlier binary documents and templates must be blocked for open/save.
- V-71095 Medium Word 2000 binary documents and templates must be configured to edit in protected view.
- V-71097 Medium Word 6.0 binary documents and templates must be configured for block open/save actions.
- V-71099 Medium Word 95 binary documents and templates must be configured to edit in protected view.
- V-71101 Medium Word 97 binary documents and templates must be configured to edit in protected view.
- V-71103 Medium Word XP binary documents and templates must be configured to edit in protected view.
- V-71107 Medium Macros must be blocked from running in Office files from the Internet.
- V-71643 Medium Files on local Intranet UNC must be opened in Protected View.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-238121
- V-71041
- Rule IDs
-
- SV-238121r961092_rule
- SV-85665
Checks: C-41331r651911_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41290r651912_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO110
- Vuln IDs
-
- V-238122
- V-71043
- Rule IDs
-
- SV-238122r961086_rule
- SV-85667
Checks: C-41332r651914_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-41291r651915_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-238123
- V-71045
- Rule IDs
-
- SV-238123r960921_rule
- SV-85669
Checks: C-41333r651917_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41292r651918_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-238124
- V-71047
- Rule IDs
-
- SV-238124r961092_rule
- SV-85671
Checks: C-41334r651920_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41293r651921_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO119
- Vuln IDs
-
- V-238125
- V-71049
- Rule IDs
-
- SV-238125r960921_rule
- SV-85673
Checks: C-41335r651923_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security "Turn off file validation" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\filevalidation Criteria: If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-41294r651924_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO121
- Vuln IDs
-
- V-238126
- V-71051
- Rule IDs
-
- SV-238126r961086_rule
- SV-85675
Checks: C-41336r651926_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" is set to "Not Configured" or "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\protectedview Criteria: If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, then this is a finding.
Fix: F-41295r651927_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files from the Internet zone in Protected View" to "Not Configured" or "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-238127
- V-71053
- Rule IDs
-
- SV-238127r961092_rule
- SV-85677
Checks: C-41337r651929_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41296r651930_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-238128
- V-71055
- Rule IDs
-
- SV-238128r960921_rule
- SV-85679
Checks: C-41338r651932_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41297r651933_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-238129
- V-71057
- Rule IDs
-
- SV-238129r961086_rule
- SV-85681
Checks: C-41339r651935_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41298r651936_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO127
- Vuln IDs
-
- V-238130
- V-71059
- Rule IDs
-
- SV-238130r960954_rule
- SV-85683
Checks: C-41340r651938_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-41299r651939_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-238131
- V-71061
- Rule IDs
-
- SV-238131r961086_rule
- SV-85685
Checks: C-41341r651941_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41300r651942_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- DTOO131
- Vuln IDs
-
- V-238132
- V-71063
- Rule IDs
-
- SV-238132r960954_rule
- SV-85687
Checks: C-41342r651944_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-41301r651945_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-238133
- V-71065
- Rule IDs
-
- SV-238133r961089_rule
- SV-85689
Checks: C-41343r651947_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41302r651948_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO133
- Vuln IDs
-
- V-238134
- V-71067
- Rule IDs
-
- SV-238134r961092_rule
- SV-85691
Checks: C-41344r651950_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-41303r651951_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Trusted Locations "Disable all trusted locations" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO134
- Vuln IDs
-
- V-238135
- V-71069
- Rule IDs
-
- SV-238135r961092_rule
- SV-85693
Checks: C-41345r651953_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\trusted locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-41304r651954_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO139
- Vuln IDs
-
- V-238136
- V-71071
- Rule IDs
-
- SV-238136r960963_rule
- SV-85695
Checks: C-41346r651956_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Save "default file format" is set to "Enabled: Word Document (.docx)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\options Criteria: If the value DefaultFormat is REG_SZ = (blank), this is not a finding.
Fix: F-41305r651957_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Save "default file format" to "Enabled: Word Document (.docx)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO142
- Vuln IDs
-
- V-238137
- V-71073
- Rule IDs
-
- SV-238137r961092_rule
- SV-85697
Checks: C-41347r651959_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Scan encrypted macros in Word Open XML documents" is set to "Disabled". The option 'Enabled: Scan encrypted macros (default)' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security Criteria: If the value WordBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-41306r651960_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Scan encrypted macros in Word Open XML documents" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO146
- Vuln IDs
-
- V-238138
- V-71075
- Rule IDs
-
- SV-238138r960963_rule
- SV-85699
Checks: C-41348r651962_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Trust access to Visual Basic Project" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security Criteria: If the value AccessVBOM is REG_DWORD = 0, this is not a finding.
Fix: F-41307r651963_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Trust access to Visual Basic Project" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-238139
- V-71077
- Rule IDs
-
- SV-238139r960921_rule
- SV-85701
Checks: C-41349r651965_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41308r651966_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-238140
- V-71079
- Rule IDs
-
- SV-238140r961779_rule
- SV-85703
Checks: C-41350r651968_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'winword.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix: F-41309r651969_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'winword.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO288
- Vuln IDs
-
- V-238141
- V-71081
- Rule IDs
-
- SV-238141r961092_rule
- SV-85705
Checks: C-41351r651971_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" is set to "Not Configured" or "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\protectedview Criteria: If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, then this is a finding.
Fix: F-41310r651972_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Do not open files in unsafe locations in Protected View" to "Not Configured" or "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO292
- Vuln IDs
-
- V-238142
- V-71083
- Rule IDs
-
- SV-238142r961092_rule
- SV-85707
Checks: C-41352r651974_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" is set to "Disabled". The option 'Enabled: Open in Protected View' and Unchecked for 'Do not allow edit' is also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Word\security\filevalidation Criteria: If the value openinprotectedview does not exist, this is not a finding. If the value is REG_DWORD = 1, this is not a finding. If the value DisableEditFromPV is set to REG_DWORD = 1, this is not a finding. If the value is set to REG_DWORD = 0, this is a finding.
Fix: F-41311r651975_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Set document behavior if file validation fails" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO293
- Vuln IDs
-
- V-238143
- V-71085
- Rule IDs
-
- SV-238143r961092_rule
- SV-85709
Checks: C-41353r651977_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following keys: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\protectedview Criteria: If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-41312r651978_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO302
- Vuln IDs
-
- V-238144
- V-71087
- Rule IDs
-
- SV-238144r961092_rule
- SV-85711
Checks: C-41354r651980_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Advanced "Update automatic links at Open" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\options Criteria: If the value DontUpdateLinks is REG_DWORD = 1, this is not a finding.
Fix: F-41313r651981_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Advanced "Update automatic links at Open" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO304
- Vuln IDs
-
- V-238145
- V-71089
- Rule IDs
-
- SV-238145r960963_rule
- SV-85713
Checks: C-41355r651983_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "VBA Macro Notification Settings" is set to "Enabled: Disable all with notification". The options 'Enabled: Disable all except digitally signed macros' and 'Enabled: Disable all without notification' are more restrictive and also acceptable values. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding. Values of REG_DWORD = 3 or 4 are also acceptable values. If the registry key does not exist or the value is REG_DWORD = 1, then this is a finding.
Fix: F-41314r651984_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "VBA Macro Notification Settings" to "Enabled (Disable all with notification)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO328
- Vuln IDs
-
- V-238146
- V-71091
- Rule IDs
-
- SV-238146r961092_rule
- SV-85715
Checks: C-41356r651986_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Miscellaneous -> "Use online translation dictionaries" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\common\research\translation Criteria: If the value useonline is REG_DWORD = 0, this is not a finding.
Fix: F-41315r651987_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Miscellaneous -> "Use online translation dictionaries" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO333
- Vuln IDs
-
- V-238147
- V-71093
- Rule IDs
-
- SV-238147r961086_rule
- SV-85717
Checks: C-41357r651989_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2 and earlier binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock Criteria: If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix: F-41316r652013_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2 and earlier binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO334
- Vuln IDs
-
- V-238148
- V-71095
- Rule IDs
-
- SV-238148r961086_rule
- SV-85719
Checks: C-41358r651992_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2000 binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock Criteria: If the value Word2000Files is REG_DWORD = 5, this is not a finding.
Fix: F-41317r652015_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 2000 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO336
- Vuln IDs
-
- V-238149
- V-71097
- Rule IDs
-
- SV-238149r961086_rule
- SV-85721
Checks: C-41359r651995_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 6.0 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock Criteria: If the value Word60Files is REG_DWORD = 2, this is not a finding.
Fix: F-41318r651996_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 6.0 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO337
- Vuln IDs
-
- V-238150
- V-71099
- Rule IDs
-
- SV-238150r961086_rule
- SV-85723
Checks: C-41360r651998_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 95 binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock Criteria: If the value Word95Files is REG_DWORD = 5, this is not a finding.
Fix: F-41319r652017_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 95 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO338
- Vuln IDs
-
- V-238151
- V-71101
- Rule IDs
-
- SV-238151r961086_rule
- SV-85725
Checks: C-41361r652001_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 97 binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock Criteria: If the value Word97Files is REG_DWORD = 5, this is not a finding.
Fix: F-41320r652019_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word 97 binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO339
- Vuln IDs
-
- V-238152
- V-71103
- Rule IDs
-
- SV-238152r961086_rule
- SV-85727
Checks: C-41362r652004_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word XP binary documents and templates" is set to "Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock Criteria: If the value WordXPFiles is REG_DWORD = 5, this is not a finding.
Fix: F-41321r652021_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Word XP binary documents and templates" to "Enabled: Allow editing and open in Protected View".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO600
- Vuln IDs
-
- V-238153
- V-71107
- Rule IDs
-
- SV-238153r961092_rule
- SV-85731
Checks: C-41363r652007_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security Criteria: If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-41322r652008_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO605
- Vuln IDs
-
- V-238154
- V-71643
- Rule IDs
-
- SV-238154r961092_rule
- SV-86267
Checks: C-41364r652010_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Open files on local Intranet UNC in Protected View" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Word\security\protectedview Criteria: If the value DisableIntranetCheck is REG_DWORD = 0, this is not a finding.
Fix: F-41323r652011_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Protected View "Open files on local Intranet UNC in Protected View" is set to "Enabled".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTO-Word999
- Vuln IDs
-
- V-279951
- Rule IDs
-
- SV-279951r1156602_rule
Checks: C-84512r1156600_chk
Word 2016 is no longer supported by the vendor. If the system is running Word 2016, this is a finding.
Fix: F-84417r1156601_fix
Upgrade to a supported version.