UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Blocking as default file block opening behavior must be enforced.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26612 DTOO110 - Word SV-33873r1_rule ECSC-1 Medium
Description
Users can open, view, or edit a large number of file types in Word 2010. Some file types are safer than others, as some could allow malicious code to become active on user computers or the network. For this reason, disabling or not configuring this setting could allow malicious code to become active on user computers or the network.
STIG Date
Microsoft Word 2010 2012-10-02

Details

Check Text ( C-34252r1_chk )
The policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Set default file block behavior” must be “Enabled: Blocked files are not opened”.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\14.0\word\security\fileblock

Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix Text (F-29946r1_fix)
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Word 2010 -> Word Options -> Security -> Trust Center -> File Block Settings “Set default file block behavior” to “Enabled: Blocked files are not opened”.