UCF STIG Viewer Logo

Microsoft Publisher 2013 STIG


Date Finding Count (15)
2018-04-04 CAT I (High): 0 CAT II (Med): 15 CAT III (Low): 0
STIG Description
The Microsoft Publisher 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles

Findings (MAC II - Mission Support Classified)

Finding ID Severity Title
V-17187 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
V-17184 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
V-26707 Medium Fatally corrupt files must be blocked from opening.
V-17173 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-17545 Medium Warning Bar settings for VBA macros must be configured.
V-26589 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
V-40893 Medium The Internet Explorer Bind to Object functionality must be enabled.
V-40895 Medium Navigation to URLs embedded in Office products must be blocked.
V-40894 Medium The Saved from URL mark must be selected to enforce Internet zone processing.
V-40896 Medium Scripted Window Security must be enforced.
V-26708 Medium The Publisher Automation Security Level must be configured for high security.
V-26587 Medium File Downloads must be configured for proper restrictions.
V-26586 Medium ActiveX Installs must be configured for proper restriction.
V-26585 Medium Protection from zone elevation must be enforced.
V-26584 Medium Add-on Management functionality must be allowed.