Blog Post

Microsoft Security Baselines Blog
4 MIN READ

Security baseline for Microsoft 365 Apps for enterprise, v2112

Rick_Munck's avatar
Rick_Munck
Icon for Microsoft rankMicrosoft
Dec 14, 2021

Microsoft is pleased to announce the release of the recommended security configuration baseline settings for Microsoft 365 Apps for enterprise, version 2112. Please download the content from the Microsoft Security Compliance Toolkit, test the recommended configurations, and implement as appropriate.

 

This baseline builds on the previous Office baseline we released April 2021. The highlights of this baseline include:

  • Excel policy name change to "Macro Notification Settings" from "VBA Macro Notification Settings". This was done in conjunction with adding the new policy to block Excel 4.0 macros.
  • Expanded macro protection isolating and blocking Excel 4.0 macros. The Excel team created a new policy: "Prevent Excel from running XLM macros". In the Trust Center this is an additional check box in the Macros Tab. We are also blocking Excel 4.0 macros by default in Office version 2109 or later, starting with Current Channel (with other channels at a later time).
  • New attributes added to Administrative Template files (ADMX/ADML) for Microsoft 365 Apps for enterprise to easily identify Security baselines and the area the policies are helping to protect.
  • Name changes of GPOs included in this baseline - to align with Microsoft branding requirements we have modified the names of the GPOs included in this baseline, see below.

 

The recommended settings in this security baseline correspond with the administrative templates version 5263, released December 13, 2021.

 

Deployment options for the baseline

IT Admins can apply baseline settings in different ways. Depending on the method(s) chosen different registry keys will be written and they will be observed in order of precedence: Office cloud policies will override ADMX/Group Policies which will override end user settings in the Trust Center.

 

  • Cloud policies may be deployed with the Office cloud policy service for policies in HKCU.  Cloud policies apply to a user on any device accessing files in Office apps with their AAD account. In Office cloud policy service, you can filter the Recommendation column to display the current Security Baselines, and within each policy's context pane the recommended baseline setting is set by default. Learn more about Office cloud policy service.
  • ADMX policies may be deployed with Microsoft Endpoint Manager (MEM) for both HKCU and HKLM policies. These settings are written to the same place as Group Policy, but managed from the cloud in MEM. There are two methods to create and deploy policy configurations: Administrative templates or the settings catalog.
  • Group Policy may be deployed with on premise AD DS to deploy Group Policy Objects (GPO) to users and computers. The downloadable baseline package includes importable GPOs, a script to apply the GPOs to local policy, a script to import the GPOs into Active Directory Group Policy, updated custom administrative template (SecGuide.ADMX/L) file, all the recommended settings in spreadsheet form and a Policy Analyzer rules file.

 

GPOs included in the baseline

Most organizations can implement the baseline’s recommended settings without any problems. However, there are a few settings that will cause operational issues for some organizations. We've broken out related groups of such settings into their own GPOs to make it easier for organizations to add or remove these restrictions as a set. The local-policy script (Baseline-LocalInstall.ps1) offers command-line options to control whether these GPOs are installed.

 

Note: Name change to “MSFT Microsoft 365 Apps v2112”. This GPO set includes “Computer” and “User” GPOs that represent the “core” settings that should be trouble free, and each of these potentially challenging GPOs:

 

  • “DDE Block - User” is a User Configuration GPO that blocks using DDE to search for existing DDE server processes or to start new ones.
  • “Legacy File Block - User” is a User Configuration GPO that prevents Office applications from opening or saving legacy file formats.
  • "Legacy JScript Block - Computer" disables the legacy JScript execution for websites in the Internet Zone and Restricted Sites Zone.
  • “Require Macro Signing - User” is a User Configuration GPO that disables unsigned macros in each of the Office applications.

 

Disable Excel 4 Macros

A new Excel policy is available to block Excel 4.0 macros separate from VBA macros:  "Prevent Excel from running XLM macros". With this new macro policy, choosing to disable XLM macros will no longer impact VBA macro settings. The setting is also available in the Trust Center for end users to modify. Therefore, to prevent end users changing the setting we recommend enabling the policy "Prevent Excel from running XLM macros".

 

AREA and AREACATEGORY attributes in ADMX Templates

A new set of attributes has been introduced to allow policies to be tagged for specific scenarios such as Security Baseline, Security, Privacy, Accessibility, etc. These tags will power upcoming features to help admins identify policies by area for easier adoption. You'll see these new columns in the spreadsheet documentation of the security baselines.

 

Example:

    <policy name="L_AllowDDE" class="User" Area="Security Baseline" AreaCategory="DDE" displayName="$(string.L_AllowDDE)" explainText="$(string.L_AllowDDEExplain)" presentation="$(presentation.L_AllowDDE)" key="software\policies\microsoft\office\16.0\word\security">

 

When can I expect the next release of Microsoft 365 Apps for enterprise Security Baseline?

In the future, we'll plan to release new security baselines every 6 months, usually in June and December.

 

If you have questions or issues, please let us know via the Security Baseline Community or this post.

 

Updated Dec 14, 2021
Version 1.0

10 Comments

  • mktl73 this would be better posted against the Edge blog post, not the Office one, but to answer your question, we missed it. The setting has no effect any longer and will be removed in version 99. 

  • mktl73's avatar
    mktl73
    Copper Contributor

    @Rick_Munck Any good reason why the baseline still includes the "TripleDESEnabled" setting?

    The setting description states "Warning: 3DES will be completely removed from Microsoft Edge in version 95 (around October 2021) and this policy will stop working then."

  • Microsoft - its great with these baselines - just make sure you publish them inside MEM as well. That goes for both Security and Update Baselines 🙂

  • danielfawcett and Rick_Munck - it looks like it's just a mistake that column D puts that row in the "Security Baseline" area. It's the only row on that sheet with Area = "Security Baseline" but nothing in column C. Seems obvious to me that one wouldn't want to keep PowerPoint from opening .pptx files, which is what y'all are talking about...

  • danielfawcett thank you for the feedback, we are glad you find the baselines useful!  For Line 1580 "PowerPoint 2007 and later presentations, shows, templates, themes and add-in files" that is actually deliberate and set to Not Configured at this time.  We constantly evaluate settings and might pick it up at a later time.

  • danielfawcett's avatar
    danielfawcett
    Copper Contributor

    Rick_Munck First, thank you for this collection of settings.  I can't tell you how helpful they are!

     

    In the accompanying spreadsheet of settings > User worksheet > row 1580, the setting "Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center\File Block Settings" is marked as part of the security baseline but there is no value in column C.  I think that it should be "Open/Save blocked, use open policy", but just wanted to highlight it.

     

  • Christian_Hemken This is work in progress on the MEM side. We are aiming to push out the built-in template for the Office baseline Q1/Q2 of next year. We will provide updates through MEM "What's New" docs so keep a look out for that!

  • TP_IT's avatar
    TP_IT
    Brass Contributor

    Are they updated in intune/config.office.com as well ?

     

    best regards

  • Rick_Munck  It is great that we can import the baselines to on-prem systems. However, when will these baselines ready to use as a template within Endpoint Manager? Additionally, the MS Security Guide is not completely available within MEM to configure.