| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 3CFB873AE566BCAC8E36564818ADB7A294FAE277 ~~~~~ 'Outlook object model prompt when reading address information' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomaddressinformationaccess Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 3CFB873AE566BCAC8E36564818ADB7A294FAE277 ~~~~~ 'Outlook object model prompt when reading address information' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomaddressinformationaccess Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 3CFB873AE566BCAC8E36564818ADB7A294FAE277 ~~~~~ 'Outlook object model prompt when reading address information' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomaddressinformationaccess Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 3CFB873AE566BCAC8E36564818ADB7A294FAE277 ~~~~~ 'Outlook object model prompt when reading address information' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomaddressinformationaccess Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomaddressinformationaccess is set to REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information to "Enabled (Automatically Deny)".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 72C51A7F58C34C6EBDDD6FA26A7CB1B7B5E133BD ~~~~~ 'Outlook object model prompt when responding to meeting and task requests' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoommeetingtaskrequestresponse Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 72C51A7F58C34C6EBDDD6FA26A7CB1B7B5E133BD ~~~~~ 'Outlook object model prompt when responding to meeting and task requests' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoommeetingtaskrequestresponse Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 72C51A7F58C34C6EBDDD6FA26A7CB1B7B5E133BD ~~~~~ 'Outlook object model prompt when responding to meeting and task requests' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoommeetingtaskrequestresponse Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 72C51A7F58C34C6EBDDD6FA26A7CB1B7B5E133BD ~~~~~ 'Outlook object model prompt when responding to meeting and task requests' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoommeetingtaskrequestresponse Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests is set to "Enabled (Automatically Deny)" Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoommeetingtaskrequestresponse is set to REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests to "Enabled (Automatically Deny)".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 2C19FE71BBCBB36E69ED3E54BB68EAEEA6933047 ~~~~~ 'Outlook object model prompt when sending mail' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomsend Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 2C19FE71BBCBB36E69ED3E54BB68EAEEA6933047 ~~~~~ 'Outlook object model prompt when sending mail' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomsend Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 2C19FE71BBCBB36E69ED3E54BB68EAEEA6933047 ~~~~~ 'Outlook object model prompt when sending mail' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomsend Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 2C19FE71BBCBB36E69ED3E54BB68EAEEA6933047 ~~~~~ 'Outlook object model prompt when sending mail' is Enabled: (Automatically Deny) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: promptoomsend Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomsend is set to REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail to "Enabled (Automatically Deny)".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 7899972D544A1715F338A25915043E9AB0865973 ~~~~~ 'Allow hyperlinks in suspected phishing e-mail messages' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: JunkMailEnableLinks Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 7899972D544A1715F338A25915043E9AB0865973 ~~~~~ 'Allow hyperlinks in suspected phishing e-mail messages' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: JunkMailEnableLinks Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 7899972D544A1715F338A25915043E9AB0865973 ~~~~~ 'Allow hyperlinks in suspected phishing e-mail messages' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: JunkMailEnableLinks Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 7899972D544A1715F338A25915043E9AB0865973 ~~~~~ 'Allow hyperlinks in suspected phishing e-mail messages' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\options\mail Value Name: JunkMailEnableLinks Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 7ED0DA3544783F504B21115FD198091895C26189 ~~~~~ 'Security setting for macros' is Enabled: (Warn for signed, disable unsigned) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: level Value: 0x00000003 (3) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 7ED0DA3544783F504B21115FD198091895C26189 ~~~~~ 'Security setting for macros' is Enabled: (Warn for signed, disable unsigned) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: level Value: 0x00000003 (3) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 7ED0DA3544783F504B21115FD198091895C26189 ~~~~~ 'Security setting for macros' is Enabled: (Warn for signed, disable unsigned) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: level Value: 0x00000003 (3) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 7ED0DA3544783F504B21115FD198091895C26189 ~~~~~ 'Security setting for macros' is Enabled: (Warn for signed, disable unsigned) Registry Path: HKCU:\software\policies\microsoft\office\16.0\outlook\security Value Name: level Value: 0x00000003 (3) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must be set to "Enabled: Warn for signed, disable unsigned". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for level is set to REG_DWORD = 3, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must to "Enabled: Warn for signed, disable unsigned".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ms project\security\trusted locations If the value allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\ms project\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1FE0B12DC2964F086861833F1CC86CDE46F2DD9D ~~~~~ Project is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ms project\security If the value for vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 4 is also acceptable. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 525EFBF4AB77188A48309CBF94931FAA450BE955 ~~~~~ 'Run Programs' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: runprograms (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 525EFBF4AB77188A48309CBF94931FAA450BE955 ~~~~~ 'Run Programs' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: runprograms (Not found) Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 525EFBF4AB77188A48309CBF94931FAA450BE955 ~~~~~ 'Run Programs' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: runprograms (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 525EFBF4AB77188A48309CBF94931FAA450BE955 ~~~~~ 'Run Programs' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: runprograms (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs is set to "Enabled" "Disable (do not run any programs)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value runprograms does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs to "Enabled" "Disable (do not run any programs)".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 8E6D05A91EA21B699B7F2E127CEE9EFFE121FD17 ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 8E6D05A91EA21B699B7F2E127CEE9EFFE121FD17 ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 8E6D05A91EA21B699B7F2E127CEE9EFFE121FD17 ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 8E6D05A91EA21B699B7F2E127CEE9EFFE121FD17 ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 09ECAE8B938CDF4FA7CE44E41813CC919D214580 ~~~~~ 'Scan encrypted macros in PowerPoint Open XML presentations' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: PowerPointBypassEncryptedMacroScan (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 09ECAE8B938CDF4FA7CE44E41813CC919D214580 ~~~~~ 'Scan encrypted macros in PowerPoint Open XML presentations' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: PowerPointBypassEncryptedMacroScan (Not found) Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 09ECAE8B938CDF4FA7CE44E41813CC919D214580 ~~~~~ 'Scan encrypted macros in PowerPoint Open XML presentations' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: PowerPointBypassEncryptedMacroScan (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 09ECAE8B938CDF4FA7CE44E41813CC919D214580 ~~~~~ 'Scan encrypted macros in PowerPoint Open XML presentations' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: PowerPointBypassEncryptedMacroScan (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" is set to "Enabled" and "Scan encrypted macros". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security If the value PowerPointBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" to "Enabled" and "Scan encrypted macros".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 16AC53ACBB077110A7706A36B2F8225940C52507 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\filevalidation Value Name: EnableOnLoad Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 16AC53ACBB077110A7706A36B2F8225940C52507 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\filevalidation Value Name: EnableOnLoad Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 16AC53ACBB077110A7706A36B2F8225940C52507 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\filevalidation Value Name: EnableOnLoad Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 16AC53ACBB077110A7706A36B2F8225940C52507 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\filevalidation Value Name: EnableOnLoad Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 6A6A1F901BBD1CCB0D135B69A91687FA4B221A1D ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 6A6A1F901BBD1CCB0D135B69A91687FA4B221A1D ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 6A6A1F901BBD1CCB0D135B69A91687FA4B221A1D ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 6A6A1F901BBD1CCB0D135B69A91687FA4B221A1D ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\powerpoint\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 8E9AD38984331BBCCF41B6F26047D9B0D44BA994 ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 8E9AD38984331BBCCF41B6F26047D9B0D44BA994 ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 8E9AD38984331BBCCF41B6F26047D9B0D44BA994 ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 8E9AD38984331BBCCF41B6F26047D9B0D44BA994 ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\powerpoint\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: F7404C4ABF30188455B63AEF73DE7D9F116E0781 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableAttachmentsInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: F7404C4ABF30188455B63AEF73DE7D9F116E0781 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableAttachmentsInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: F7404C4ABF30188455B63AEF73DE7D9F116E0781 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableAttachmentsInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: F7404C4ABF30188455B63AEF73DE7D9F116E0781 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\protectedview Value Name: DisableAttachmentsInPV Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: BB83D4755F70C287AA859AE88C12B96B7FF2BFC6 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: BB83D4755F70C287AA859AE88C12B96B7FF2BFC6 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: BB83D4755F70C287AA859AE88C12B96B7FF2BFC6 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: BB83D4755F70C287AA859AE88C12B96B7FF2BFC6 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 11BD6198BBF5C200317DDE1B3BDD0B2BAD40E7B7 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\trusted locations Value Name: AllowNetworkLocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 11BD6198BBF5C200317DDE1B3BDD0B2BAD40E7B7 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\trusted locations Value Name: AllowNetworkLocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 11BD6198BBF5C200317DDE1B3BDD0B2BAD40E7B7 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\trusted locations Value Name: AllowNetworkLocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 11BD6198BBF5C200317DDE1B3BDD0B2BAD40E7B7 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\powerpoint\security\trusted locations Value Name: AllowNetworkLocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level is set to "Enabled" "By UI (prompted)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\security If the value automationsecuritypublisher is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level to "Enabled" "By UI (prompted)"
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 1B14783CF63C3D4A579D7EFE45C12D37D30264B3 ~~~~~ Publisher is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 4 is also acceptable. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings must be set to "Enabled" and "Disable all except digitally signed macros".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" and "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value for vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 4 is also acceptable. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" and select "Disable all except digitally signed macros".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to Enabled. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to Enabled.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2000files" is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2003files" is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio50andearlierfiles" is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: A8A4844569B06E3D9028AFEAFC436F82F1A552AA ~~~~~ Visio is not installed so this requirement is NA per the STIG Overview. Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 419843462258497497E74CA2D88F8C1397E5177D ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 419843462258497497E74CA2D88F8C1397E5177D ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 419843462258497497E74CA2D88F8C1397E5177D ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 419843462258497497E74CA2D88F8C1397E5177D ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: notbpromptunsignedaddin Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value for notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: D55AB693730EA180137BA4599159E0F027BB30CE ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: WordBypassEncryptedMacroScan (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: D55AB693730EA180137BA4599159E0F027BB30CE ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: WordBypassEncryptedMacroScan (Not found) Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: D55AB693730EA180137BA4599159E0F027BB30CE ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: WordBypassEncryptedMacroScan (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: D55AB693730EA180137BA4599159E0F027BB30CE ~~~~~ 'Disable Trust Bar Notification for unsigned application add-ins and block them' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: WordBypassEncryptedMacroScan (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents is set to "Enabled" "Scan encrypted macros (default)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value WordBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents to "Enabled" "Scan encrypted macros (default)".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: EBE624DF2AC6F71FC8A51E45650999D315E29E2F ~~~~~ 'Do not open files from the Internet zone in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableinternetfilesinpv (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: EBE624DF2AC6F71FC8A51E45650999D315E29E2F ~~~~~ 'Do not open files from the Internet zone in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableinternetfilesinpv (Not found) Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: EBE624DF2AC6F71FC8A51E45650999D315E29E2F ~~~~~ 'Do not open files from the Internet zone in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableinternetfilesinpv (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: EBE624DF2AC6F71FC8A51E45650999D315E29E2F ~~~~~ 'Do not open files from the Internet zone in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableinternetfilesinpv (Not found) Comments |
|||||
Check Text
Verify the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableinternetfilesinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix Text
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 39AA2D404B74630552087E659D06325198D6F18E ~~~~~ 'Do not open files in unsafe locations in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableunsafelocationsinpv (Not found) Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 39AA2D404B74630552087E659D06325198D6F18E ~~~~~ 'Do not open files in unsafe locations in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableunsafelocationsinpv (Not found) Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 39AA2D404B74630552087E659D06325198D6F18E ~~~~~ 'Do not open files in unsafe locations in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableunsafelocationsinpv (Not found) Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 39AA2D404B74630552087E659D06325198D6F18E ~~~~~ 'Do not open files in unsafe locations in Protected View' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableunsafelocationsinpv (Not found) Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview. If the value for disableunsafelocationsinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix Text
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 4033328D0BBF040F24B833322971B54DDF4C9A95 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 4033328D0BBF040F24B833322971B54DDF4C9A95 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 4033328D0BBF040F24B833322971B54DDF4C9A95 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 4033328D0BBF040F24B833322971B54DDF4C9A95 ~~~~~ 'Set document behvior if file validateion fails' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: openinprotectedview (Not found) 'Allow edit' is Unchecked Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\security\filevalidation Value Name: DisableEditFromPV Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Word\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 940DE327C9C4C8A0F9E788225F66571E4D8AE626 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableattachmentsinpv Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 940DE327C9C4C8A0F9E788225F66571E4D8AE626 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableattachmentsinpv Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 940DE327C9C4C8A0F9E788225F66571E4D8AE626 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableattachmentsinpv Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 940DE327C9C4C8A0F9E788225F66571E4D8AE626 ~~~~~ 'Turn off Protected View for attachments opened from Outlook' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\protectedview Value Name: disableattachmentsinpv Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableattachmentsinpv is REG_DWORD = 0, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: E20BB652553112B9D779FDE6ED8A97ED1E0184AA ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: E20BB652553112B9D779FDE6ED8A97ED1E0184AA ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: E20BB652553112B9D779FDE6ED8A97ED1E0184AA ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: E20BB652553112B9D779FDE6ED8A97ED1E0184AA ~~~~~ 'Set default file block behavior' is Enabled: (Blocked files are not opened) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: OpenInProtectedView Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 4141B58403170F053F5229FED712713E27134056 ~~~~~ 'Word 2 and earlier binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2Files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 4141B58403170F053F5229FED712713E27134056 ~~~~~ 'Word 2 and earlier binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2Files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 4141B58403170F053F5229FED712713E27134056 ~~~~~ 'Word 2 and earlier binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2Files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 4141B58403170F053F5229FED712713E27134056 ~~~~~ 'Word 2 and earlier binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: Word2Files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: F92AD76657B4329B2D90EBDC6818BB15D18D22F8 ~~~~~ 'Word 6.0 binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word60files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: F92AD76657B4329B2D90EBDC6818BB15D18D22F8 ~~~~~ 'Word 6.0 binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word60files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: F92AD76657B4329B2D90EBDC6818BB15D18D22F8 ~~~~~ 'Word 6.0 binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word60files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: F92AD76657B4329B2D90EBDC6818BB15D18D22F8 ~~~~~ 'Word 6.0 binary documents and templates' is Enabled: (Open/Save blocked, use open policy) Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\fileblock Value Name: word60files Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word60files is REG_DWORD = 2, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 261104A8EE4EA15039470FEA66E29686CA3193F4 ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 261104A8EE4EA15039470FEA66E29686CA3193F4 ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 261104A8EE4EA15039470FEA66E29686CA3193F4 ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 261104A8EE4EA15039470FEA66E29686CA3193F4 ~~~~~ 'Block macros from running in Office files from the Internet' is Enabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security Value Name: blockcontentexecutionfrominternet Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: CC97687F7F423BC5EEA52DA559254FC2DE6015E3 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\trusted locations Value Name: allownetworklocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: CC97687F7F423BC5EEA52DA559254FC2DE6015E3 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\trusted locations Value Name: allownetworklocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: CC97687F7F423BC5EEA52DA559254FC2DE6015E3 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\trusted locations Value Name: allownetworklocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: CC97687F7F423BC5EEA52DA559254FC2DE6015E3 ~~~~~ 'Allow Trusted Locations on the network' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\trusted locations Value Name: allownetworklocations Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network to "Disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: F99D7556B8778BB1EF7F0E19536B564736FF1A35 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\filevalidation Value Name: enableonload Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: F99D7556B8778BB1EF7F0E19536B564736FF1A35 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\filevalidation Value Name: enableonload Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: F99D7556B8778BB1EF7F0E19536B564736FF1A35 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\filevalidation Value Name: enableonload Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: F99D7556B8778BB1EF7F0E19536B564736FF1A35 ~~~~~ 'Turn off file validation' is Disabled Registry Path: HKCU:\software\policies\microsoft\office\16.0\word\security\filevalidation Value Name: enableonload Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\filevalidation If the value for enableonload is REG_DWORD = 1, this is not a finding.
Fix Text
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation to "Disabled".