STIGQter STIGQter: STIG Summary: Microsoft Word 2016 Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Nov 2016:

Blocking as default file block opening behavior must be enforced.

DISA Rule

SV-85667r1_rule

Vulnerability Number

V-71043

Group Title

SRG-APP-000207

Rule Version

DTOO110

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".

Check Contents

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock

Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.

Vulnerability Number

V-71043

Documentable

False

Rule Version

DTOO110

Severity Override Guidance

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock

Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.

Check Content Reference

M

Target Key

3133

Comments