Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-17588 | DTOO177 - Office | SV-18714r1_rule | ECSC-1 | Medium |
Description |
---|
Having access to updates, add-ins, and patches on the Office Online Web site can help users ensure that their computers are up to date and equipped with the latest security patches. However, to ensure that updates are tested and applied in a consistent manner, many organizations prefer to roll out updates using a centralized mechanism such as Microsoft Systems Center or Windows Server Update Services. By default, users are allowed to download updates, add-ins, and patches from the Office Online Web site to keep their 2007 Office applications running smoothly and securely. If your organization has policies that govern the use of external resources such as Office Online, allowing users to download updates might cause them to violate these policies. |
STIG | Date |
---|---|
Microsoft Office System 2007 | 2014-01-07 |
Check Text ( C-18888r1_chk ) |
---|
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options “Disable access to updates, add-ins, and patches on the Office Online website” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\Internet Criteria: If the value DisableDownloadCenterAccess is REG_DWORD = 1, this is not a finding. |
Fix Text (F-17506r1_fix) |
---|
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Tools \ Options \ General \ Web Options “Disable access to updates, add-ins, and patches on the Office Online website” will be set to “Enabled”. "Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)." "Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required." |