UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Microsoft Publisher 2013 STIG


Overview

Date Finding Count (15)
2018-04-04 CAT I (High): 0 CAT II (Med): 15 CAT III (Low): 0
STIG Description
The Microsoft Publisher 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Public)

Finding ID Severity Title
V-17187 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
V-17184 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
V-26707 Medium Fatally corrupt files must be blocked from opening.
V-17173 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-17545 Medium Warning Bar settings for VBA macros must be configured.
V-26589 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
V-40893 Medium The Internet Explorer Bind to Object functionality must be enabled.
V-40895 Medium Navigation to URLs embedded in Office products must be blocked.
V-40894 Medium The Saved from URL mark must be selected to enforce Internet zone processing.
V-40896 Medium Scripted Window Security must be enforced.
V-26708 Medium The Publisher Automation Security Level must be configured for high security.
V-26587 Medium File Downloads must be configured for proper restrictions.
V-26586 Medium ActiveX Installs must be configured for proper restriction.
V-26585 Medium Protection from zone elevation must be enforced.
V-26584 Medium Add-on Management functionality must be allowed.