UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Configure the "disable hyperlink warnings" for Office to Disable.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17659 DTOO194 - Office SV-18814r1_rule ECSC-1 Medium
Description
Unsafe hyperlinks are links that might pose a security risk if users click them. Clicking an unsafe link could compromise the security of sensitive information or harm the computer. Links that 2007 Office considers unsafe include links to executable files, TIFF files, and Microsoft Document Imaging (MDI) files. Other unsafe links are those that use protocols considered to be unsafe, including msn, nntp, mms, outlook, and stssync. By default, 2007 Office applications notify users about unsafe hyperlinks and disable them until users enable them.
STIG Date
Microsoft Office System 2007 2015-10-02

Details

Check Text ( C-18930r1_chk )
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable hyperlink warnings” will be set to “Disabled”.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\12.0\Common\Security

Criteria: If the value DisableHyperLinkWarning is REG_DWORD = 0, this is not a finding.
Fix Text (F-17557r1_fix)
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2007 system -> Security Settings “Disable hyperlink warnings” will be set to “Disabled”.

"Note: Group Policy Administrative Templates are available from the www.microsoft.com download site. The MS Office 2007 System (Office12.adm) is included in the AdminTemplates.exe file. This template provides the
mechanisms to incorporate Microsoft Office 2007 System policies via the Microsoft Group Policy Editor (gpedit.msc)."

"Note: If the Microsoft Group Policy Editor (gpedit.msc) is not used to incorporate the remediation to this vulnerability the Microsoft Registry Editor (regedit.exe) may be used to create the registry key and value required."