Skip to main content
CUI

Vulnerability V-223298

Back

V-223298

CAT II

User name and password must be disabled in all Office programs.

Ships Affected
1
Total Findings
4
Open
0
Closed
4

Check Text

Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE If the value for all installed programs is REG_DWORD = 1, this is not a finding.

Fix Text

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" to "Enabled" and select the check boxes for all installed Office programs.

STIG Reference

STIG
Microsoft Office 365 ProPlus Security Technical Implementation Guide
Version
3
Release
5
Rule ID
SV-223298r961092_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl
Unassigned 2026-03-04T15:25:42.171357 View in Context
USNS MONTFORD POINT T-ESD-1 MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl
Unassigned 2026-03-04T15:25:16.145630 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl
Unassigned 2026-01-14T12:57:28.231385 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl
Unassigned 2026-01-14T12:57:25.987513 View in Context
CUI