| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 9DDB186572ED15640793DAEE033F73ADAAA60FCF ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 9DDB186572ED15640793DAEE033F73ADAAA60FCF ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: FC94CFDB01489BB3DCBE54E95CC9BCDE68B30EF8 ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: winword.exe (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: FC94CFDB01489BB3DCBE54E95CC9BCDE68B30EF8 ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING Value Name: winword.exe (Not found) Comments |
|||||
Check Text
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Consistent Mime Handling is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_handling If the value for all installed Office programs is set to is REG_DWORD=1, this is not a finding.
Fix Text
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Consistent Mime Handling" to "Enabled" and select the check boxes for all installed Office programs.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 4F2A67597F5495206BAE91A6C0B5B94BD2A9352E ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 4F2A67597F5495206BAE91A6C0B5B94BD2A9352E ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: B346E2707A18C4CEAC7F7CC8F68FF239A9FFF94F ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: winword.exe (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: B346E2707A18C4CEAC7F7CC8F68FF239A9FFF94F ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Value Name: winword.exe (Not found) Comments |
|||||
Check Text
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_securityband If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar to "Enabled" and select the check boxes for all installed Office programs.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 96CDC116ACA736DBD380B669AABB2561979B8AC4 ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 96CDC116ACA736DBD380B669AABB2561979B8AC4 ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: 034BAD73C1935D5E39A3D9EED467087D11FA518A ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: winword.exe (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: 034BAD73C1935D5E39A3D9EED467087D11FA518A ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Value Name: winword.exe (Not found) Comments |
|||||
Check Text
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown Security is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_localmachine_lockdown If the value for all installed Office programs is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown to "Enabled" and select the check boxes for all installed Office programs.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: B0007D250E40573F072AC78311ACB6CD5E94AC60 ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: B0007D250E40573F072AC78311ACB6CD5E94AC60 ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: CFCC40024D675A58F96279F54C4DA9512ACD98C5 ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: winword.exe (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: CFCC40024D675A58F96279F54C4DA9512ACD98C5 ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_SNIFFING Value Name: winword.exe (Not found) Comments |
|||||
Check Text
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_sniffing If the value for all installed Office Programs is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature to "Enabled" for all installed Office programs.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 9F013CA112A1AF3FF737F41658DE97D384A23B93 ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 ResultHash: 9F013CA112A1AF3FF737F41658DE97D384A23B93 ~~~~~ Installed Programs: Access, Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: msaccess.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: excel.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: outlook.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: powerpnt.exe Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: winword.exe Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: FA0C41E4C183B574FB75BD7F0DAA29210C8FD9C1 ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: winword.exe (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: FA0C41E4C183B574FB75BD7F0DAA29210C8FD9C1 ~~~~~ Installed Programs: Excel, Outlook, PowerPoint, Word Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: excel.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: outlook.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: powerpnt.exe (Not found) Registry Path: HKLM:\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_OBJECT_CACHING Value Name: winword.exe (Not found) Comments |
|||||
Check Text
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_object_caching If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection to "Enabled" and select the check boxes for all installed Office programs.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 48A820BC171F3156C77314E945A7A64A74F38DF5 ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 48A820BC171F3156C77314E945A7A64A74F38DF5 ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 48A820BC171F3156C77314E945A7A64A74F38DF5 ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 48A820BC171F3156C77314E945A7A64A74F38DF5 ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> "Macro Notification Settings" is set to "Enabled" and "Disable VBA macros except digitally signed macros" from the Options is selected. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\excel\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 4 is also acceptable. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> "Macro Notification Settings" is set to "Enabled" and select "Disable VBA macros except digitally signed macros" from the Options.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: D77698ED1B5C3707DA52B927D395C22DB9837D59 ~~~~~ 'File Block Settings 'Excel 95 workbooks'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: xl95workbooks Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: D77698ED1B5C3707DA52B927D395C22DB9837D59 ~~~~~ 'File Block Settings 'Excel 95 workbooks'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: xl95workbooks Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: D77698ED1B5C3707DA52B927D395C22DB9837D59 ~~~~~ 'File Block Settings 'Excel 95 workbooks'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: xl95workbooks Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: D77698ED1B5C3707DA52B927D395C22DB9837D59 ~~~~~ 'File Block Settings 'Excel 95 workbooks'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: xl95workbooks Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\fileblock If the value for xl95workbooks is REG_DWORD = 2, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks to "Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 5EDA40DF7442F8EE58DD271634EBB6778E874824 ~~~~~ 'File Block Settings 'Excel 95-97 workbooks and templates'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: XL9597WorkbooksandTemplates Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 5EDA40DF7442F8EE58DD271634EBB6778E874824 ~~~~~ 'File Block Settings 'Excel 95-97 workbooks and templates'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: XL9597WorkbooksandTemplates Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 5EDA40DF7442F8EE58DD271634EBB6778E874824 ~~~~~ 'File Block Settings 'Excel 95-97 workbooks and templates'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: XL9597WorkbooksandTemplates Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 5EDA40DF7442F8EE58DD271634EBB6778E874824 ~~~~~ 'File Block Settings 'Excel 95-97 workbooks and templates'' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock Value Name: XL9597WorkbooksandTemplates Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\office\16.0\excel\security\fileblock If the value XL9597WorkbooksandTemplates is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" to "Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 695C01367D613236A11E98AF3F14EBE486C3A0E3 ~~~~~ 'VBA Macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 695C01367D613236A11E98AF3F14EBE486C3A0E3 ~~~~~ 'VBA Macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 695C01367D613236A11E98AF3F14EBE486C3A0E3 ~~~~~ 'VBA Macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 695C01367D613236A11E98AF3F14EBE486C3A0E3 ~~~~~ 'VBA Macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value for vbawarnings is REG_DWORD = 3 this is not a finding. A value of REG_DWORD = 4 is also acceptable. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 3E1FC09E630C472154972BE5932D3282C4DE9338 ~~~~~ 'Word 2000 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2000Files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 3E1FC09E630C472154972BE5932D3282C4DE9338 ~~~~~ 'Word 2000 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2000Files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 3E1FC09E630C472154972BE5932D3282C4DE9338 ~~~~~ 'Word 2000 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2000Files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 3E1FC09E630C472154972BE5932D3282C4DE9338 ~~~~~ 'Word 2000 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2000Files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2000Files is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: BE33D318390B449985D2AA79FB456B94ED9E1FF6 ~~~~~ 'Word 95 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word95files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: BE33D318390B449985D2AA79FB456B94ED9E1FF6 ~~~~~ 'Word 95 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word95files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: BE33D318390B449985D2AA79FB456B94ED9E1FF6 ~~~~~ 'Word 95 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word95files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: BE33D318390B449985D2AA79FB456B94ED9E1FF6 ~~~~~ 'Word 95 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word95files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word95files is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: E784D1DA5F97CBA1EE0BDA63B7D555DEAE2A907A ~~~~~ 'Word 97 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word97files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: E784D1DA5F97CBA1EE0BDA63B7D555DEAE2A907A ~~~~~ 'Word 97 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word97files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: E784D1DA5F97CBA1EE0BDA63B7D555DEAE2A907A ~~~~~ 'Word 97 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word97files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: E784D1DA5F97CBA1EE0BDA63B7D555DEAE2A907A ~~~~~ 'Word 97 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word97files Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word97files is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 80D92FA19465440D3073030D51C998AEF52B5FF7 ~~~~~ 'Word XP binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: wordxpfiles Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 80D92FA19465440D3073030D51C998AEF52B5FF7 ~~~~~ 'Word XP binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: wordxpfiles Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 80D92FA19465440D3073030D51C998AEF52B5FF7 ~~~~~ 'Word XP binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: wordxpfiles Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 80D92FA19465440D3073030D51C998AEF52B5FF7 ~~~~~ 'Word XP binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: wordxpfiles Value: 0x00000005 (5) [Expected 2] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value wordxpfiles is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 1EC453ABE6D5138768991EAE2D9DFC645C0DCD2C ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 1EC453ABE6D5138768991EAE2D9DFC645C0DCD2C ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 1EC453ABE6D5138768991EAE2D9DFC645C0DCD2C ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 1EC453ABE6D5138768991EAE2D9DFC645C0DCD2C ~~~~~ 'VBA macro Notification Settings' is NOT Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: vbawarnings Value: 0x00000002 (2) [Expected 3 or 4] Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" is set to "Enabled" and "Disable all except digitally signed macros" from the Options. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\word\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 4 is also acceptable. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" to "Enabled" and "Disable all except digitally signed macros" from the Options.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: AB82DA94F817279F4C1E1EE501914F339AF03BC7 ~~~~~ 'Block macros from running in Office files from the Internet' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: blockcontentexecutionfrominternet (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: AB82DA94F817279F4C1E1EE501914F339AF03BC7 ~~~~~ 'Block macros from running in Office files from the Internet' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: blockcontentexecutionfrominternet (Not found) Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 768CBCFE1F018055B3389A766B3AF7F113FA43CC ~~~~~ 'Macro Runtime Scan Scope' is Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 768CBCFE1F018055B3389A766B3AF7F113FA43CC ~~~~~ 'Macro Runtime Scan Scope' is Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: CD29181397F2AB43C4CCB0FEEC184B9FA25E48FF ~~~~~ 'Macro Runtime Scan Scope' is NOT Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: CD29181397F2AB43C4CCB0FEEC184B9FA25E48FF ~~~~~ 'Macro Runtime Scan Scope' is NOT Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: B95BF163F165A17CDF6801AB61F6271A2B2BFEE6 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: B95BF163F165A17CDF6801AB61F6271A2B2BFEE6 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 96CDC01572877ED081B14F7FA86B9AD03B070EC5 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 96CDC01572877ED081B14F7FA86B9AD03B070EC5 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 784F7F3F487B6D1C548011727F63550D6130E993 ~~~~~ 'Disable UI extending from documents and templates' is Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 784F7F3F487B6D1C548011727F63550D6130E993 ~~~~~ 'Disable UI extending from documents and templates' is Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: D7A3C2FCBB825CA5C98C3FDDD47E431EFA116602 ~~~~~ 'Disable UI extending from documents and templates' is NOT Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: D7A3C2FCBB825CA5C98C3FDDD47E431EFA116602 ~~~~~ 'Disable UI extending from documents and templates' is NOT Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 171AC734BEDB5475F871E568C292B1F50A6972C4 ~~~~~ 'Block Flash activation in Office documents' is Enabled: (Block all activation) Registry Path: HKLM:\SOFTWARE\Microsoft\Office\Common\COM Compatibility Value Name: COMMENT Value: Block all Flash activation Type: REG_SZ Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 171AC734BEDB5475F871E568C292B1F50A6972C4 ~~~~~ 'Block Flash activation in Office documents' is Enabled: (Block all activation) Registry Path: HKLM:\SOFTWARE\Microsoft\Office\Common\COM Compatibility Value Name: COMMENT Value: Block all Flash activation Type: REG_SZ Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: 4DE737C1BFDFBC891A7FC39E7105A8B39446DF88 ~~~~~ 'Block Flash activation in Office documents' is NOT Enabled: (Block all activation) Registry Path: HKLM:\SOFTWARE\Microsoft\Office\Common\COM Compatibility Value Name: COMMENT (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 ResultHash: 4DE737C1BFDFBC891A7FC39E7105A8B39446DF88 ~~~~~ 'Block Flash activation in Office documents' is NOT Enabled: (Block all activation) Registry Path: HKLM:\SOFTWARE\Microsoft\Office\Common\COM Compatibility Value Name: COMMENT (Not found) Comments |
|||||
Check Text
Verify the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation is set to "Enabled" Block all activation. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Microsoft\Office\Common\COM Compatibility If the value for COMMENT is REG_SZ = Block all Flash activation, this is not a finding.
Fix Text
Set the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation to "Enabled" (Block all activation).
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 7E5731CF8FADBD0CC47863F2C22FB5DF1D2C87AA ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server launch in Excel' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlaunch Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 7E5731CF8FADBD0CC47863F2C22FB5DF1D2C87AA ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server launch in Excel' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlaunch Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: BBA5A336D17B95566A0BD1AB5AC8D265C75A0172 ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server launch in Excel' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlaunch (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: BBA5A336D17B95566A0BD1AB5AC8D265C75A0172 ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server launch in Excel' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlaunch (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlaunch" is REG_DWORD = 1, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: BE57798F42D253F153AD001AB441542E642D655C ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server lookup in Excel' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlookup Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: BE57798F42D253F153AD001AB441542E642D655C ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server lookup in Excel' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlookup Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: A09F08C180B9EFDCD3A3332CDC901B2838A136F6 ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server lookup in Excel' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlookup (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: A09F08C180B9EFDCD3A3332CDC901B2838A136F6 ~~~~~ 'Don't allow Dynamic Data Exchange (DDE) server lookup in Excel' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\external content Value Name: disableddeserverlookup (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlookup" is REG_DWORD = 1, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 4B807D2DE77E281652EE437DD97B6BAC3A7A158A ~~~~~ 'Ask to update automatic links' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options\binaryoptions Value Name: fupdateext_78_1 Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 4B807D2DE77E281652EE437DD97B6BAC3A7A158A ~~~~~ 'Ask to update automatic links' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options\binaryoptions Value Name: fupdateext_78_1 Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 6B1D21A6B62673251DABECE80D96C11C72692567 ~~~~~ 'Ask to update automatic links' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options\binaryoptions Value Name: fupdateext_78_1 (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 6B1D21A6B62673251DABECE80D96C11C72692567 ~~~~~ 'Ask to update automatic links' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options\binaryoptions Value Name: fupdateext_78_1 (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options\binaryoptions If the value for fupdateext_78_1 is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: DF3BF350535AB271E12CE9517D7CA34A856BB161 ~~~~~ 'Load pictures from Web pages not created in Excel' is Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\internet Value Name: donotloadpictures Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: DF3BF350535AB271E12CE9517D7CA34A856BB161 ~~~~~ 'Load pictures from Web pages not created in Excel' is Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\internet Value Name: donotloadpictures Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 7C060C55DCEC0645DCF8620A7C398851A3B4DE19 ~~~~~ 'Load pictures from Web pages not created in Excel' is NOT Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\internet Value Name: donotloadpictures (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 7C060C55DCEC0645DCF8620A7C398851A3B4DE19 ~~~~~ 'Load pictures from Web pages not created in Excel' is NOT Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\internet Value Name: donotloadpictures (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General. Load pictures from Web pages not created in Excel is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\internet If the value for donotloadpictures is REG_DWORD = 1, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General >> Load pictures from Web pages not created in Excel to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: E7D7F44EC3B02F0E69B6E9C88667CDF23EFFCC52 ~~~~~ 'Disable AutoRepublish' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublish Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: E7D7F44EC3B02F0E69B6E9C88667CDF23EFFCC52 ~~~~~ 'Disable AutoRepublish' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublish Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: CF624D913092478981CB1E7B067607F0273F2B4E ~~~~~ 'Disable AutoRepublish' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublish (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: CF624D913092478981CB1E7B067607F0273F2B4E ~~~~~ 'Disable AutoRepublish' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublish (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish is to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If the value for disableautorepublish is REG_DWORD = 1, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 178EC8CC5CA91EFBA47AE02DCC74772127C42918 ~~~~~ 'Do not show AutoRepublish warning alert' is Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublishwarning Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 178EC8CC5CA91EFBA47AE02DCC74772127C42918 ~~~~~ 'Do not show AutoRepublish warning alert' is Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublishwarning Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: E4583DFC58A25B096D6AA7DB788706549210B44B ~~~~~ 'Do not show AutoRepublish warning alert' is NOT Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublishwarning (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: E4583DFC58A25B096D6AA7DB788706549210B44B ~~~~~ 'Do not show AutoRepublish warning alert' is NOT Disabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\options Value Name: disableautorepublishwarning (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If value for disableautorepublishwarning is REG_DWORD = 0, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 8143E19ADF5341F6856B7357273757628C5DBBD7 ~~~~~ 'Force file extension to match file type' is Enabled: (Always match file type) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: extensionhardening Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 8143E19ADF5341F6856B7357273757628C5DBBD7 ~~~~~ 'Force file extension to match file type' is Enabled: (Always match file type) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: extensionhardening Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 8C79D425D53FDF90DC546882F8D817A99E441BCB ~~~~~ 'Force file extension to match file type' is NOT Enabled: (Always match file type) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: extensionhardening (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 8C79D425D53FDF90DC546882F8D817A99E441BCB ~~~~~ 'Force file extension to match file type' is NOT Enabled: (Always match file type) Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security Value Name: extensionhardening (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type is set to "Always match file type". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If value for extensionhardening is REG_DWORD = 2, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type to "Enabled" and select the option "Always match file type".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 465D4554F71A21FF379FD446BE2CE014BBF89B24 ~~~~~ 'Always prevent untrusted Microsoft Query files from opening' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\office\16.0\excel\security\external content Value Name: enableblockunsecurequeryfiles Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 465D4554F71A21FF379FD446BE2CE014BBF89B24 ~~~~~ 'Always prevent untrusted Microsoft Query files from opening' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\office\16.0\excel\security\external content Value Name: enableblockunsecurequeryfiles Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 82D7D3AF6527645A597B5902655CF02075B86448 ~~~~~ 'Always prevent untrusted Microsoft Query files from opening' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\office\16.0\excel\security\external content Value Name: enableblockunsecurequeryfiles (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 82D7D3AF6527645A597B5902655CF02075B86448 ~~~~~ 'Always prevent untrusted Microsoft Query files from opening' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\office\16.0\excel\security\external content Value Name: enableblockunsecurequeryfiles (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\external content. Value for enableblockunsecurequeryfiles should be REG_DWORD = 1 If the value for enableblockunsecurequeryfiles is Reg_DWORD = 1, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 451A8A8DE1883B7E90DDA37CFD83733B657FC7CA ~~~~~ 'Always open untrusted database files in Protected View' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\protectedview Value Name: enabledatabasefileprotectedview Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 451A8A8DE1883B7E90DDA37CFD83733B657FC7CA ~~~~~ 'Always open untrusted database files in Protected View' is Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\protectedview Value Name: enabledatabasefileprotectedview Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 0CDB19168E8808FE2E627541B6B3C8867E646865 ~~~~~ 'Always open untrusted database files in Protected View' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\protectedview Value Name: enabledatabasefileprotectedview (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 0CDB19168E8808FE2E627541B6B3C8867E646865 ~~~~~ 'Always open untrusted database files in Protected View' is NOT Enabled Registry Path: HKCU:\Software\Policies\Microsoft\Office\16.0\excel\security\protectedview Value Name: enabledatabasefileprotectedview (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Always open untrusted database files in Protected View is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value for enabledatabasefileprotectedview is REG_DWORD = 1, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Always open untrusted database files in Protected View to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 242B02494150CC39BF63097E5D403F333F085943 ~~~~~ 'Use Unicode format when dragging e-mail message to file system' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\general Value Name: msgformat Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 242B02494150CC39BF63097E5D403F333F085943 ~~~~~ 'Use Unicode format when dragging e-mail message to file system' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\general Value Name: msgformat Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 5CC6371388F754400CE2259E6BBC0F88571031CC ~~~~~ 'Use Unicode format when dragging e-mail message to file system' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\general Value Name: msgformat (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 5CC6371388F754400CE2259E6BBC0F88571031CC ~~~~~ 'Use Unicode format when dragging e-mail message to file system' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\general Value Name: msgformat (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system is set to "Disabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\general If the value for msgformat is set to REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 4ECDFC11B01678DA255D83E3F9F6252837EE5E3B ~~~~~ 'Junk E-mail protection level' is Configured Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: junkmailprotection Value: 0x00000003 (3) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 4ECDFC11B01678DA255D83E3F9F6252837EE5E3B ~~~~~ 'Junk E-mail protection level' is Configured Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: junkmailprotection Value: 0x00000003 (3) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: B559D6629C7F0F5A167B784C458B03694ECDC8F1 ~~~~~ 'Junk E-mail protection level' is NOT Configured Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: junkmailprotection (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: B559D6629C7F0F5A167B784C458B03694ECDC8F1 ~~~~~ 'Junk E-mail protection level' is NOT Configured Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: junkmailprotection (Not found) Comments |
|||||
Check Text
Note: If the Outlook client application is not used to access Office 365 email (i.e., email is only accessed via Outlook Web Access [OWA]), this is not applicable. Verify Outlook Junk E-mail protection is set to "No Automatic Filtering". In Outlook, click Home tab >> Delete group >> Junk >> Junk E-mail Options. Verify Junk E-mail protection is set to "No Automatic Filtering". If the system being inspected is not behind EEMSG, CBII, or O365 EOP, the Junk E-mail protection level must be set to "High". Otherwise, "Low" is acceptable. If Junk E-mail protection is not set to "No Automatic Filtering", this is a finding. If the system is not behind enterprise-level capabilities such as EEMSG, CBII, or O365 EOP and the Junk E-mail protection is not set to "High", this is a finding. If the system is behind enterprise-level capabilities such as EEMSG, CBII, or O365 EOP, and the Junk E-mail protection is not at least "Low", this is a finding.
Fix Text
In Outlook, click Home tab >> Delete group >> Junk >> Junk E-mail Options. Set the Junk E-mail protection level to "No Automatic Filtering".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: CEBE73FDC6FC575984344165FB6A5855AEEE410D ~~~~~ 'Do not display 'Publish to GAL' button' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: publishtogaldisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: CEBE73FDC6FC575984344165FB6A5855AEEE410D ~~~~~ 'Do not display 'Publish to GAL' button' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: publishtogaldisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: E26BF48A222F223BF6AFE43EE4EFFE8F177588D9 ~~~~~ 'Do not display 'Publish to GAL' button' is NOT Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: publishtogaldisabled (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: E26BF48A222F223BF6AFE43EE4EFFE8F177588D9 ~~~~~ 'Do not display 'Publish to GAL' button' is NOT Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: publishtogaldisabled (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for publishtogaldisabled is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: E2C9F73B190E6B29BBEABEB8CFD74A547C3BDC99 ~~~~~ 'Signature Warning' is Enabled: (Always warn about invalid signatures) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: warnaboutinvalid Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: E2C9F73B190E6B29BBEABEB8CFD74A547C3BDC99 ~~~~~ 'Signature Warning' is Enabled: (Always warn about invalid signatures) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: warnaboutinvalid Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 95D1054DF08C3BF8E75C59217FA722AC91F0A403 ~~~~~ 'Signature Warning' is NOT Enabled: (Always warn about invalid signatures) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: warnaboutinvalid (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 95D1054DF08C3BF8E75C59217FA722AC91F0A403 ~~~~~ 'Signature Warning' is NOT Enabled: (Always warn about invalid signatures) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: warnaboutinvalid (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning is set to "Enabled" "Always warn about invalid signatures". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for warnaboutinvalid is set to REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning to "Enabled" "Always warn about invalid signatures".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: C9A6531D5B24CFC7619806A6D6E425E1B680E1C0 ~~~~~ 'Allow users to demote attachments to Level 2' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: allowuserstolowerattachments Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: C9A6531D5B24CFC7619806A6D6E425E1B680E1C0 ~~~~~ 'Allow users to demote attachments to Level 2' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: allowuserstolowerattachments Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: E30E1F7DE03FE7A54A9A427833B2CCFADF8E6974 ~~~~~ 'Allow users to demote attachments to Level 2' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: allowuserstolowerattachments (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: E30E1F7DE03FE7A54A9A427833B2CCFADF8E6974 ~~~~~ 'Allow users to demote attachments to Level 2' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: allowuserstolowerattachments (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value allowuserstolowerattachments is set to REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 534BAD649726BDDAAA64EF44A60E4BC01148139E ~~~~~ 'PowerPoint 97-2003 presentations, shows, templates and add-in files' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: binaryfiles Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 534BAD649726BDDAAA64EF44A60E4BC01148139E ~~~~~ 'PowerPoint 97-2003 presentations, shows, templates and add-in files' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: binaryfiles Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: E2BBDE7FE4B84AB263FDD95940FB06D835BD9DD5 ~~~~~ 'PowerPoint 97-2003 presentations, shows, templates and add-in files' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: binaryfiles (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: E2BBDE7FE4B84AB263FDD95940FB06D835BD9DD5 ~~~~~ 'PowerPoint 97-2003 presentations, shows, templates and add-in files' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: binaryfiles (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files is set to "Enabled" "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security\fileblock If the value for binaryfiles is set to REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files to "Enabled" "Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: BE55A58B56B838F4B022590398F738F64B293047 ~~~~~ 'Do not open files from the Internet zone in Protected View' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableInternetFilesInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: BE55A58B56B838F4B022590398F738F64B293047 ~~~~~ 'Do not open files from the Internet zone in Protected View' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableInternetFilesInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 8CC339BB941F870F4489121C0371F5FA383293DD ~~~~~ 'Do not open files from the Internet zone in Protected View' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableInternetFilesInPV (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 8CC339BB941F870F4489121C0371F5FA383293DD ~~~~~ 'Do not open files from the Internet zone in Protected View' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableInternetFilesInPV (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 8391A90CCD9FBCC216AE4267890E8F2461F4A035 ~~~~~ 'Do not open files in unsafe locations in Protected View' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableUnsafeLocationsInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 8391A90CCD9FBCC216AE4267890E8F2461F4A035 ~~~~~ 'Do not open files in unsafe locations in Protected View' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableUnsafeLocationsInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: C26A9112506C3C5AC758F56F9FB9769EB3309EC6 ~~~~~ 'Do not open files in unsafe locations in Protected View' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableUnsafeLocationsInPV (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: C26A9112506C3C5AC758F56F9FB9769EB3309EC6 ~~~~~ 'Do not open files in unsafe locations in Protected View' is NOT Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableUnsafeLocationsInPV (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 9B013977DFDFD374D7B76CC5D2E657F3618E1DFB ~~~~~ 'Word 2003 binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2003files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 9B013977DFDFD374D7B76CC5D2E657F3618E1DFB ~~~~~ 'Word 2003 binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2003files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: A0ADCBF06FD3E6A23DC7487FE033307B7CDD55E8 ~~~~~ 'Word 2003 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2003files (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: A0ADCBF06FD3E6A23DC7487FE033307B7CDD55E8 ~~~~~ 'Word 2003 binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2003files (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2003files is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: B4F304984F907991205776A823510156A2551FE2 ~~~~~ 'Word 2007 and later binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2007files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: B4F304984F907991205776A823510156A2551FE2 ~~~~~ 'Word 2007 and later binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2007files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 9301841C7E005CF28AC60D17D27F21CCD22A243C ~~~~~ 'Word 2007 and later binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2007files (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 9301841C7E005CF28AC60D17D27F21CCD22A243C ~~~~~ 'Word 2007 and later binary documents and templates' is NOT Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word2007files (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2007files is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: FA1B0546362AA5A11841448F5C8094D526A8E3AF ~~~~~ 'Configure the level of client software diagnostic data sent by Office to Microsoft' is NOT Enabled: (Neither) Registry Path: HKCU:\software\policies\Microsoft\office\common\clienttelemetry Value Name: SendTelemetry (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: FA1B0546362AA5A11841448F5C8094D526A8E3AF ~~~~~ 'Configure the level of client software diagnostic data sent by Office to Microsoft' is NOT Enabled: (Neither) Registry Path: HKCU:\software\policies\Microsoft\office\common\clienttelemetry Value Name: SendTelemetry (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Privacy >> Trust Center >> "Configure the level of client software diagnostic data sent by Office to Microsoft" is set to "Enabled", and "Neither" from the Options is selected. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\common\clienttelemetry If the value "SendTelemetry" is "REG_DWORD = 3", this is not a finding. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Privacy >> Trust Center >> "Configure the level of client software diagnostic data sent by Office to Microsoft" to "Enabled" and select "Neither" from the Options.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 29FDB6AA469A6985C7CE97F46AE1FBD37871E6B2 ~~~~~ 'Trust Center Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: NoTBPromptUnsignedAddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 29FDB6AA469A6985C7CE97F46AE1FBD37871E6B2 ~~~~~ 'Trust Center Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: NoTBPromptUnsignedAddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: D77C2E82A7D572EAD04E7C6040314D3C5652C6B1 ~~~~~ 'VBA Macro Notification Settings' is Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: vbawarnings Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: D77C2E82A7D572EAD04E7C6040314D3C5652C6B1 ~~~~~ 'VBA Macro Notification Settings' is Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: vbawarnings Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 2 or REG_DWORD = 4 is also acceptable. If the registry key does not exist, or is not configured properly, this is a finding.
Fix Text
Set User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found) Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls is set to REG_DWORD=6, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value trustbar is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: C6978785DAA1AD95595D1AF476BB273878619C61 ~~~~~ 'Allow mix of policy and user locations' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security\trusted locations Value Name: allow user locations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: C6978785DAA1AD95595D1AF476BB273878619C61 ~~~~~ 'Allow mix of policy and user locations' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security\trusted locations Value Name: allow user locations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: C6978785DAA1AD95595D1AF476BB273878619C61 ~~~~~ 'Allow mix of policy and user locations' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security\trusted locations Value Name: allow user locations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: C6978785DAA1AD95595D1AF476BB273878619C61 ~~~~~ 'Allow mix of policy and user locations' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security\trusted locations Value Name: allow user locations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016\Security Settings\Trust Center >> Allow mix of policy and user locations is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security\trusted locations If the value for allow user locations is set to REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Trust Center >> Allow mix of policy and user locations to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: F127074E69D3A14AB4B225A7DF706EEC2774F2CA ~~~~~ 'Disable Smart Document's use of manifests' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\common\smart tag Value Name: neverloadmanifests Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: F127074E69D3A14AB4B225A7DF706EEC2774F2CA ~~~~~ 'Disable Smart Document's use of manifests' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\common\smart tag Value Name: neverloadmanifests Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: F127074E69D3A14AB4B225A7DF706EEC2774F2CA ~~~~~ 'Disable Smart Document's use of manifests' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\common\smart tag Value Name: neverloadmanifests Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: F127074E69D3A14AB4B225A7DF706EEC2774F2CA ~~~~~ 'Disable Smart Document's use of manifests' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\common\smart tag Value Name: neverloadmanifests Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\smart tag If the value for neverloadmanifests is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 852DF74195C553BD82F48E32096BAA7BD65C16F8 ~~~~~ 'Load Controls in Forms3' is Enabled: (1) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\vba\security Value Name: LoadControlsInForms Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 852DF74195C553BD82F48E32096BAA7BD65C16F8 ~~~~~ 'Load Controls in Forms3' is Enabled: (1) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\vba\security Value Name: LoadControlsInForms Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 852DF74195C553BD82F48E32096BAA7BD65C16F8 ~~~~~ 'Load Controls in Forms3' is Enabled: (1) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\vba\security Value Name: LoadControlsInForms Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 852DF74195C553BD82F48E32096BAA7BD65C16F8 ~~~~~ 'Load Controls in Forms3' is Enabled: (1) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\vba\security Value Name: LoadControlsInForms Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" is set to Enabled and 1 from drop down. (For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration.)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\VBA\Security If the value LoadControlsInForms is REG_DWORD=1, this is not a finding. If the value LoadControlsInForms does not exist, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" to "Enabled:1" or set it to "Disabled."