STIGQter STIGQter: STIG Summary: Microsoft Excel 2013 STIG Version: 1 Release: 7 Benchmark Date: 27 Apr 2018:

File types must be configured to provide mismatch warnings

DISA Rule

SV-53811r1_rule

Vulnerability Number

V-17621

Group Title

DTOO143 - Force File Extension to match type

Rule Version

DTOO143

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2013 -> Excel Options -> Security "Force file extension to match file type" to "Enabled (Allow different, but warn)".

Check Contents

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2013 -> Excel Options -> Security "Force file extension to match file type" is set to "Enabled (Allow different, but warn)".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\excel\security

Criteria: If the value ExtensionHardening is REG_DWORD = 1, this is not a finding.

Vulnerability Number

V-17621

Documentable

False

Rule Version

DTOO143

Severity Override Guidance

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2013 -> Excel Options -> Security "Force file extension to match file type" is set to "Enabled (Allow different, but warn)".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\excel\security

Criteria: If the value ExtensionHardening is REG_DWORD = 1, this is not a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

2478

Comments