STIGQter STIGQter: STIG Summary: Microsoft Office 365 ProPlus Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The use of network locations must be ignored in PowerPoint.

DISA Rule

SV-223389r508019_rule

Vulnerability Number

V-223389

Group Title

SRG-APP-000210

Rule Version

O365-PT-000013

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".

Check Contents

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled".

Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations

If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.

Vulnerability Number

V-223389

Documentable

False

Rule Version

O365-PT-000013

Severity Override Guidance

Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled".

Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations

If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.

Check Content Reference

M

Target Key

4099

Comments