| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-223285 | CAT I | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Document metadata for rights managed Office Open X... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223285 | CAT I | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Document metadata for rights managed Office Open X... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223285 | CAT I | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Document metadata for rights managed Office Open X... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223285 | CAT I | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Document metadata for rights managed Office Open X... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: B16ADE515E363F887C68C49630239CB917515255 ~~~~~ 'Protect document metadata for rights managed Office Open XML Files' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: DRMEncryptProperty Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223280 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Macros must be blocked from running in Access file... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview.
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223280 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Macros must be blocked from running in Access file... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview.
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223280 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Macros must be blocked from running in Access file... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: AB82DA94F817279F4C1E1EE501914F339AF03BC7 ~~~~~ 'Block macros from running in Office files from the Internet' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: blockcontentexecutionfrominternet (Not found)
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223280 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Macros must be blocked from running in Access file... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be OPEN on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: AB82DA94F817279F4C1E1EE501914F339AF03BC7 ~~~~~ 'Block macros from running in Office files from the Internet' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: blockcontentexecutionfrominternet (Not found)
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223281 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Trust Bar Notifications for unsigned application a... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview.
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223281 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Trust Bar Notifications for unsigned application a... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview.
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223281 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Trust Bar Notifications for unsigned application a... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 29FDB6AA469A6985C7CE97F46AE1FBD37871E6B2 ~~~~~ 'Trust Center Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: NoTBPromptUnsignedAddin Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223281 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Trust Bar Notifications for unsigned application a... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 29FDB6AA469A6985C7CE97F46AE1FBD37871E6B2 ~~~~~ 'Trust Center Disable Trust Bar Notification for unsigned application add-ins and block them' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: NoTBPromptUnsignedAddin Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223282 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | VBA macros not digitally signed must be blocked in... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 2 or REG_DWORD = 4 is also acceptable. If the registry key does not exist, or is not configured properly, this is a finding. Fix TextSet User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview.
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223282 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | VBA macros not digitally signed must be blocked in... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 2 or REG_DWORD = 4 is also acceptable. If the registry key does not exist, or is not configured properly, this is a finding. Fix TextSet User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT APPLICABLE on 10/23/2025 ResultHash: 48067347C7A76ADFF02F273DAFA024366DD667FD ~~~~~ Access is not installed so this requirement is NA per the STIG Overview.
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223282 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | VBA macros not digitally signed must be blocked in... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 2 or REG_DWORD = 4 is also acceptable. If the registry key does not exist, or is not configured properly, this is a finding. Fix TextSet User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: D77C2E82A7D572EAD04E7C6040314D3C5652C6B1 ~~~~~ 'VBA Macro Notification Settings' is Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: vbawarnings Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223282 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | VBA macros not digitally signed must be blocked in... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 2 or REG_DWORD = 4 is also acceptable. If the registry key does not exist, or is not configured properly, this is a finding. Fix TextSet User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: D77C2E82A7D572EAD04E7C6040314D3C5652C6B1 ~~~~~ 'VBA Macro Notification Settings' is Enabled: (Disable all except digitally signed macros) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\access\security Value Name: vbawarnings Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223284 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | The Macro Runtime Scan Scope must be enabled for a... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: CD29181397F2AB43C4CCB0FEEC184B9FA25E48FF ~~~~~ 'Macro Runtime Scan Scope' is NOT Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope (Not found)
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223284 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | The Macro Runtime Scan Scope must be enabled for a... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: CD29181397F2AB43C4CCB0FEEC184B9FA25E48FF ~~~~~ 'Macro Runtime Scan Scope' is NOT Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope (Not found)
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223284 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | The Macro Runtime Scan Scope must be enabled for a... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 768CBCFE1F018055B3389A766B3AF7F113FA43CC ~~~~~ 'Macro Runtime Scan Scope' is Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223284 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | The Macro Runtime Scan Scope must be enabled for a... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 768CBCFE1F018055B3389A766B3AF7F113FA43CC ~~~~~ 'Macro Runtime Scan Scope' is Enabled: (Enable for all documents) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: macroruntimescanscope Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223286 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | The Office client must be prevented from polling t... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 96CDC01572877ED081B14F7FA86B9AD03B070EC5 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled (Not found)
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223286 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | The Office client must be prevented from polling t... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 96CDC01572877ED081B14F7FA86B9AD03B070EC5 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is NOT Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled (Not found)
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223286 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | The Office client must be prevented from polling t... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: B95BF163F165A17CDF6801AB61F6271A2B2BFEE6 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223286 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | The Office client must be prevented from polling t... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: B95BF163F165A17CDF6801AB61F6271A2B2BFEE6 ~~~~~ 'Disable the Office client from polling the SharePoint Server for published links' is Enabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\portal Value Name: linkpublishingdisabled Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223287 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Custom user interface (UI) code must be blocked fr... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: D7A3C2FCBB825CA5C98C3FDDD47E431EFA116602 ~~~~~ 'Disable UI extending from documents and templates' is NOT Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument (Not found)
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223287 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Custom user interface (UI) code must be blocked fr... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be OPEN on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: D7A3C2FCBB825CA5C98C3FDDD47E431EFA116602 ~~~~~ 'Disable UI extending from documents and templates' is NOT Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument (Not found) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument (Not found)
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223287 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Custom user interface (UI) code must be blocked fr... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 784F7F3F487B6D1C548011727F63550D6130E993 ~~~~~ 'Disable UI extending from documents and templates' is Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223287 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Custom user interface (UI) code must be blocked fr... | Documented Pending Review | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 784F7F3F487B6D1C548011727F63550D6130E993 ~~~~~ 'Disable UI extending from documents and templates' is Enabled: (Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\access Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\excel Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\infopath Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\outlook Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\powerpoint Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\project Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\publisher Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\visio Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\toolbars\word Value Name: noextensibilitycustomizationfromdocument Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223288 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | ActiveX Controls must be initialized in Safe Mode. | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls is set to REG_DWORD=6, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found)
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223288 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | ActiveX Controls must be initialized in Safe Mode. | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls is set to REG_DWORD=6, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found)
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223288 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | ActiveX Controls must be initialized in Safe Mode. | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls is set to REG_DWORD=6, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found)
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223288 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | ActiveX Controls must be initialized in Safe Mode. | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls is set to REG_DWORD=6, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: F514C7A140197E88FA4A733F7619DC87B196355D ~~~~~ 'ActiveX Control Initialization' is Not Configured in group policy which is acceptable per the STIG. Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: UFIControls (Not found)
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223289 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Macros in all Office applications that are opened ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223289 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Macros in all Office applications that are opened ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223289 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Macros in all Office applications that are opened ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223289 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Macros in all Office applications that are opened ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 9E43BB267DC28C5D3914CBFBB29691C47779E3B8 ~~~~~ 'Automation Security' is Enabled: (Use application macro security level) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\Common\Security Value Name: AutomationSecurity Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223290 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Trust Bar notifications must be configured to disp... | - | |||
Check TextVerify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value trustbar is REG_DWORD = 0, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223290 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Trust Bar notifications must be configured to disp... | - | |||
Check TextVerify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value trustbar is REG_DWORD = 0, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223290 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Trust Bar notifications must be configured to disp... | - | |||
Check TextVerify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value trustbar is REG_DWORD = 0, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223290 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Trust Bar notifications must be configured to disp... | - | |||
Check TextVerify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value trustbar is REG_DWORD = 0, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: CE9FC3D125AF67B46A61CA1175F8B8EDA6E2715A ~~~~~ 'Disable all Trust Bar notifications for security issues' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\trustcenter Value Name: trustbar Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223291 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223291 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223291 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223291 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 51F7F04A8BE8E239EFB2FA6988635FFCEAD49DBD ~~~~~ 'Encryption type for password protected Office 97-2003 files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: defaultencryption12 Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223292 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223292 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||
| V-223292 | CAT II | MONT-SW-89108 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89108\Scan.Admin UserSID: S-1-5-21-4163428051-2768110797-3591193048-1016 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Scan Date: 2026-03-04T15:25:16.145630
Technology Area: Windows Operating System
|
||||||||
| V-223292 | CAT II | MONT-SW-89134 | Microsoft Office 365 ProPlus Security Te... | Office applications must be configured to specify ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-Office365_Checks) found this to be NOT A FINDING on 12/17/2025 Username: MONT-SW-89134\dod_admin UserSID: S-1-5-21-4004422625-1934610219-1178763574-1001 ResultHash: 6F7CCD4C1C3077DDF7BE01E2AC1772ADE732C237 ~~~~~ 'Encryption type for password protected Office Open XML files' is Enabled: (Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256) Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security Value Name: OpenXMLEncryption Value: Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256 Type: REG_SZ
Source: MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Scan Date: 2026-03-04T15:25:42.171357
Technology Area: Windows Operating System
|
||||||||
| V-223293 | CAT II | MONT-WS-92040 | Microsoft Office 365 ProPlus Security Te... | Users must be prevented from creating new trusted ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016\Security Settings\Trust Center >> Allow mix of policy and user locations is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security\trusted locations If the value for allow user locations is set to REG_DWORD = 0, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Trust Center >> Allow mix of policy and user locations to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\W.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1106 ResultHash: C6978785DAA1AD95595D1AF476BB273878619C61 ~~~~~ 'Allow mix of policy and user locations' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security\trusted locations Value Name: allow user locations Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Scan Date: 2026-01-14T12:57:25.987513
Technology Area: Windows Operating System
|
||||||||
| V-223293 | CAT II | MONT-WS-92010 | Microsoft Office 365 ProPlus Security Te... | Users must be prevented from creating new trusted ... | - | |||
Check TextVerify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016\Security Settings\Trust Center >> Allow mix of policy and user locations is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security\trusted locations If the value for allow user locations is set to REG_DWORD = 0, this is not a finding. Fix TextSet the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Trust Center >> Allow mix of policy and user locations to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-Office365_Checks) found this to be NOT A FINDING on 10/23/2025 Username: MONTFORD-POINT\D.Admin UserSID: S-1-5-21-1360995287-4027491577-3040029667-1104 ResultHash: C6978785DAA1AD95595D1AF476BB273878619C61 ~~~~~ 'Allow mix of policy and user locations' is Disabled Registry Path: HKCU:\SOFTWARE\Policies\Microsoft\Office\16.0\common\security\trusted locations Value Name: allow user locations Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Scan Date: 2026-01-14T12:57:28.231385
Technology Area: Windows Operating System
|
||||||||