V-223311
CAT IIVBA Macros not digitally signed must be blocked in Excel.
- Ships Affected
- 1
- Total Findings
- 4
- Open
- 4
- Closed
- 0
Check Text
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> "Macro Notification Settings" is set to "Enabled" and "Disable VBA macros except digitally signed macros" from the Options is selected.
Use the Windows Registry Editor to navigate to the following key:
HKCU\software\policies\Microsoft\office\16.0\excel\security
If the value vbawarnings is REG_DWORD = 3, this is not a finding. A value of REG_DWORD = 4 is also acceptable. If the registry key does not exist or is not configured properly, this is a finding.
Fix Text
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> "Macro Notification Settings" is set to "Enabled" and select "Disable VBA macros except digitally signed macros" from the Options.
STIG Reference
- STIG
- Microsoft Office 365 ProPlus Security Technical Implementation Guide
- Version
- 3
- Release
- 5
- Rule ID
- SV-223311r960963_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89134_MSOffice365_V3R4_20251217-201101.ckl | Unassigned | 2026-03-04T15:25:42.171357 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89108_MSOffice365_V3R4_20251217-202911.ckl | Unassigned | 2026-03-04T15:25:16.145630 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSOffice365_V3R3_20251023-141031.ckl | Unassigned | 2026-01-14T12:57:28.231385 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSOffice365_V3R3_20251023-142330.ckl | Unassigned | 2026-01-14T12:57:25.987513 | View in Context |