UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Blocking as default file block opening behavior must be enforced.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26612 DTOO110 SV-53555r1_rule ECSC-1 Medium
Description
Users can open, view, or edit a large number of file types in Office 2013. Some file types are safer than others, as some could allow malicious code to become active on user computers or the network. For this reason, disabling or not configuring this setting could allow malicious code to become active on user computers or the network.
STIG Date
Microsoft Word 2013 STIG 2014-12-23

Details

Check Text ( C-47708r1_chk )
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\word\security\fileblock

Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix Text (F-46480r1_fix)
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2013 -> Word Options -> Security -> Trust Center -> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".