O365-CO-000016 - User name and password must be disabled in all Office programs

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:[email protected]. A malicious user might use this URL syntax to create a hyperlink that appears to open a legitimate website but actually opens a deceptive (spoofed) website. For example, the URL http://[email protected] appears to open http://www.wingtiptoys.com but actually opens http://example.com. To protect users from such attacks, Internet Explorer usually blocks any URLs using this syntax.

Solution

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security 'Disable user name and password' to 'Enabled' and select the check boxes for all installed Office programs.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Office_365_ProPlus_V2R11_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001170, Rule-ID|SV-223298r879630_rule, STIG-ID|O365-CO-000016, STIG-Legacy|SV-108775, STIG-Legacy|V-99671, Vuln-ID|V-223298

Plugin: Windows

Control ID: 5c32bb5d33ae8d329200d1b07586d86f173085d8a8dcf9ce6c16c0170b5eeb97