Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-26612 | DTOO110 | SV-53555r1_rule | ECSC-1 | Medium |
Description |
---|
Users can open, view, or edit a large number of file types in Office 2013. Some file types are safer than others, as some could allow malicious code to become active on user computers or the network. For this reason, disabling or not configuring this setting could allow malicious code to become active on user computers or the network. |
STIG | Date |
---|---|
Microsoft Word 2013 STIG | 2014-12-23 |
Check Text ( C-47708r1_chk ) |
---|
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding. |
Fix Text (F-46480r1_fix) |
---|
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened". |