Home
%3CLINGO-SUB%20id%3D%22lingo-sub-808328%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Office%20365%20ProPlus%20(v1907%2C%20July%202019)%20-%20DRAFT%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-808328%22%20slang%3D%22en-US%22%3E%3CP%3EReally%20nice%20summary%20and%20thank%20you%20for%20the%20templates!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-837343%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Office%20365%20ProPlus%20(v1907%2C%20July%202019)%20-%20DRAFT%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-837343%22%20slang%3D%22en-US%22%3E%3CP%3E%22%3CSPAN%3EBlock%20macros%20from%20running%20in%20Office%20files%20from%20the%20Internet%3C%2FSPAN%3E%22%20is%20causing%20operational%20issues%20for%20the%20org%20I%20work%20for.%3C%2FP%3E%3CP%3EProbably%20it%20should%20not%20be%20in%20baseline%20until%20it%20works%20as%20expected.%3C%2FP%3E%3CP%3EIt%20blocks%20macros%20for%20files%20that%20are%20opened%20from%20Trusted%20or%20Intranet%20sites.%20Another%20interesting%20finding%20is%20that%20it%20seems%20like%20this%20GPO%20will%20block%20macros%20in%20files%20saved%20and%20launched%20from%20INetCache%20folder%2C%20the%20folder%20where%20IE11%20stores%20temp%20Internet%20files.%20Trusted%20or%20Intranet%20sites%20can%20store%20and%20open%20files%20from%20this%20location%2C%20and%20will%20be%20blocked.%20We%20have%20been%20seeing%20the%20issue%20mostly%20with%20IE11.%3C%2FP%3E%3CP%3EWe%20would%20expect%20that%20macros%20in%20Excel%20files%20from%20Intranet%20or%20Trusted%20sites%20should%20not%20be%20blocked.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-771308%22%20slang%3D%22en-US%22%3ESecurity%20baseline%20for%20Office%20365%20ProPlus%20(v1907%2C%20July%202019)%20-%20DRAFT%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-771308%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%20color%3D%22%23FF0000%22%3E%3CEM%3E%5BUpdate%2C%2024%20September%202019%3A%20final%20version%20of%20this%20baseline%20released%20and%20is%20now%20available%20as%20part%20of%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fdownload%2Fdetails.aspx%3Fid%3D55319%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20Compliance%20Toolkit%3C%2FA%3E.%5D%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20is%20pleased%20to%20announce%20the%20%3CEM%3Edraft%20%3C%2FEM%3Erelease%20of%20the%20recommended%20security%20configuration%20baseline%20settings%20for%20Microsoft%20Office%20365%20ProPlus%2C%20version%201907.%20Please%20evaluate%20this%20proposed%20baseline%20and%20send%20us%20your%20feedback%20through%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Security-Baselines%2Fbd-p%2FSecurity-Baselines%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBaselines%20Discussion%20site%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20baseline%20builds%20on%20the%20overhauled%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fsecguide%2F2018%2F02%2F13%2Fsecurity-baseline-for-office-2016-and-office-365-proplus-apps-final%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20baseline%20we%20released%20in%20early%202018%3C%2FA%3E.%20The%20highlights%20of%20this%20baseline%20include%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EComponentization%20of%20GPOs%20so%20that%20%E2%80%9Cchallenging%E2%80%9D%20settings%20can%20be%20added%20or%20removed%20as%20a%20unit.%3C%2FLI%3E%0A%3CLI%3EComprehensive%20blocking%20of%20legacy%20file%20formats%3C%2FLI%3E%0A%3CLI%3EBlocking%20Excel%20from%20using%20Dynamic%20Data%20Exchange%20(DDE)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EAlso%20see%20the%20announcements%20at%20the%20end%20of%20this%20post%20regarding%20the%20new%20Security%20Policy%20Advisor%20and%20Office%20cloud%20policy%20services.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20downloadable%20attachment%20to%20this%20blog%20post%20includes%20importable%20GPOs%2C%20a%20script%20to%20apply%20the%20GPOs%20to%20local%20policy%2C%20a%20custom%20administrative%20template%20(ADMX)%20file%20for%20Group%20Policy%20settings%2C%20all%20the%20recommended%20settings%20in%20spreadsheet%20form%20and%20as%20Policy%20Analyzer%20rules.%20The%20recommended%20settings%20correspond%20with%20the%20Office%20365%20ProPlus%20administrative%20templates%20version%204888%20released%20on%20July%2017%2C%202019%20that%20can%20be%20downloaded%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3Fid%3D49030%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20The%20download%20for%20the%20final%20version%20of%20this%20baseline%20will%20be%20released%20through%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fsecurity-compliance-toolkit-10%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20Compliance%20Toolkit%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComponentization%20of%20GPOs%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EMost%20organizations%20can%20implement%20most%20of%20the%20baseline%E2%80%99s%20recommended%20settings%20without%20any%20problems.%20However%2C%20there%20are%20a%20few%20settings%20that%20will%20cause%20operational%20issues%20for%20some%20organizations.%20We%20have%20broken%20out%20related%20groups%20of%20such%20settings%20into%20their%20own%20GPOs%20to%20make%20it%20easier%20for%20organizations%20to%20add%20or%20remove%20these%20restrictions%20as%20a%20set.%20The%20local-policy%20script%2C%20BaselineLocalInstall.ps1%2C%20offers%20command-line%20options%20to%20control%20whether%20these%20GPOs%20are%20installed.%3C%2FP%3E%0A%3CP%3EThe%20%E2%80%9CMSFT%20Office%20365%20ProPlus%201907%E2%80%9D%20GPO%20set%20includes%20%E2%80%9CComputer%E2%80%9D%20and%20%E2%80%9CUser%E2%80%9D%20GPOs%20that%20represent%20the%20%E2%80%9Ccore%E2%80%9D%20settings%20that%20should%20be%20trouble%20free%2C%20and%20each%20of%20these%20potentially%20challenging%20GPOs%2C%20each%20of%20which%20is%20described%20later%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%E2%80%9CLegacy%20File%20Block%20%E2%80%93%20User%E2%80%9D%20is%20a%20User%20Configuration%20GPO%20that%20prevents%20Office%20applications%20from%20loading%20or%20saving%20legacy%20file%20formats.%3C%2FLI%3E%0A%3CLI%3E%E2%80%9CRequire%20Macro%20Signing%20%E2%80%93%20User%E2%80%9D%20is%20a%20User%20Configuration%20GPO%20that%20disables%20unsigned%20macros%20in%20each%20of%20the%20Office%20applications.%3C%2FLI%3E%0A%3CLI%3E%E2%80%9CExcel%20DDE%20Block%20%E2%80%93%20User%E2%80%9D%20is%20a%20User%20Configuration%20GPO%20that%20blocks%20Excel%20from%20using%20DDE%20to%20search%20for%20existing%20DDE%20server%20processes%20or%20to%20start%20new%20ones.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComprehensive%20blocking%20of%20legacy%20file%20formats%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20the%20previous%20Office%20baseline%20we%20published%2C%20we%20tried%20to%20end%20the%20use%20of%20legacy%20file%20formats%2C%20including%20all%20the%20old%20Office%20document%20formats%20such%20as%20*.doc%2C%20*.xls%2C%20and%20*.ppt.%20However%2C%20we%20missed%20some%20important%20ones.%20So%20we%20just%20went%20ahead%20and%20fixed%20the%20glitch.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOne%20of%20the%20threats%20of%20these%20old%20binary%20file%20formats%20is%20that%20their%20inherent%20complexity%20too%20often%20led%20to%20exploitable%20bugs%20in%20their%20parsers.%20The%20bigger%20threat%20is%20that%20many%20of%20these%20formats%20can%20include%20macros%20or%20other%20executable%20instructions%20that%20are%20easily%20abused.%20By%20contrast%2C%20macros%20are%20disabled%20with%20the%20most-commonly%20used%20Office%20Open%20XML%20(OOXML)%20document%20formats%2C%20which%20were%20first%20introduced%20with%20Office%202007.%20Only%20macro-enabled%20formats%20such%20as%20*.docm%20and%20*.xlsm%20support%20macros%2C%20and%20these%20can%20be%20filtered%20at%20the%20point%20of%20ingress.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20fixing%20the%20glitch%2C%20however%2C%20we%20also%20recognized%20that%20many%20organizations%20cannot%20entirely%20end%20their%20use%20of%20legacy%20Office%20document%20formats%2C%20so%20we%20broke%20out%20the%20file-blocking%20settings%20into%20a%20separate%20GPO%2C%20so%20they%20can%20be%20added%20or%20removed%20as%20a%20cohesive%20unit.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EBlocking%20Excel%20from%20using%20DDE%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EDynamic%20Data%20Exchange%20(DDE)%20is%20a%20%3CEM%3Every%3C%2FEM%3Eold%20interprocess%20communication%20method%20that%20is%20still%20used%20in%20some%20parts%20of%20Windows%20and%20remains%20supported%20for%20applications%20to%20use%2C%20primarily%20for%20backward%20compatibility.%20A%20few%20years%20ago%2C%20malware%20authors%20began%20embedding%20specially-formed%20DDE%20references%20in%20Office%20documents%20that%20were%20sent%20to%20victims%20and%20that%20would%20run%20attacker-chosen%20code.%20Since%20then%2C%20most%20Office%20apps%20quietly%20disabled%20the%20use%20of%20DDE.%20Excel%20retained%20user-configurable%20settings%20to%20enable%20DDE%20server%20process%20lookup%20and%20launch.%20These%20can%20now%20be%20configured%20through%20Group%20Policy%2C%20and%20this%20baseline%20recommends%20disabling%20both%20settings.%20Because%20of%20the%20likelihood%20that%20some%20organizations%20still%20depend%20on%20this%20functionality%2C%20we%20have%20broken%20out%20%E2%80%9CExcel%20DDE%20Block%E2%80%9D%20as%20a%20separate%20GPO.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMacro%20signing%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20baseline%20also%20retains%20the%20%E2%80%9CVBA%20Macro%20Notification%20Settings%E2%80%9D%20options%20from%20our%20previous%20baselines%20that%20require%20that%20macros%20embedded%20in%20Office%20documents%20be%20signed%20by%20a%20trusted%20publisher.%20We%20recognize%20that%20some%20organizations%20have%20had%20workflows%20and%20processes%20relying%20on%20such%20macros%20for%20a%20long%20time%2C%20and%20that%20enforcing%20these%20particular%20settings%20can%20cause%20operational%20issues.%20It%20can%20also%20be%20challenging%20to%20identify%20all%20the%20documents%20and%20VBA%20projects%20that%20need%20to%20be%20signed.%20We%20have%20decided%20at%20this%20time%20to%20move%20these%20settings%20into%20a%20separate%20GPO%20to%20make%20it%20easier%20to%20switch%20the%20settings%20on%20or%20off%20without%20affecting%20the%20rest%20of%20the%20baseline.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENote%20that%20the%20%E2%80%9C%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2016%2F03%2F22%2Fnew-feature-in-office-2016-can-block-macros-and-help-prevent-infection%2F%3Fsource%3Dmmpc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBlock%20macros%20from%20running%20in%20Office%20files%20from%20the%20Internet%3C%2FA%3E%E2%80%9D%20settings%20we%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fsecguide%2F2018%2F02%2F13%2Fsecurity-baseline-for-office-2016-and-office-365-proplus-apps-final%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eturned%20on%20in%20the%20previous%20baseline%3C%2FA%3Eare%20retained%20in%20the%20main%20GPOs%20and%20should%20be%20enforced%20by%20all%20security-conscious%20organizations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAlso%20see%20below%20about%20how%20the%20new%20Security%20Policy%20Advisor%20service%20can%20provide%20tailored%20recommendations%20for%20VBA%20macro%20policies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EOther%20changes%20in%20the%20baseline%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%E2%80%9CBlock%20macros%20from%20running%20in%20Office%20files%20from%20the%20Internet%E2%80%9D%20is%20now%20supported%20for%20Access%2C%20so%20we%20added%20it.%3C%2FLI%3E%0A%3CLI%3EImplemented%20new%20settings%20to%20block%20the%20opening%20of%20certain%20untrusted%20files%20and%20to%20open%20others%20in%20Protected%20View.%3C%2FLI%3E%0A%3CLI%3EEnabled%20the%20new%20%E2%80%9CMacro%20Runtime%20Scan%20Scope%E2%80%9D%20setting.%3C%2FLI%3E%0A%3CLI%3ERemoved%20the%20file%20block%20setting%20for%20%E2%80%9CPowerPoint%20beta%20converters%2C%E2%80%9D%20as%20Office%20no%20longer%20implements%20that%20block.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDeploy%20policies%20from%20the%20cloud%2C%20and%20get%20tailored%20recommendations%20for%20specific%20security%20policies%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20addition%20to%20being%20able%20deploy%20these%20policies%20through%20Active%20Directory%20Group%20Policy%20or%20through%20Local%20Group%20Policy%2C%20you%20now%20have%20a%20new%20way%20to%20deploy%20user-based%20policies%20from%20the%20cloud%20to%20any%20Office%20355%20ProPlus%20client%20through%20the%20new%20Office%20cloud%20policy%20service.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fo365clientmgmt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20cloud%20policy%20service%3C%2FA%3E%20allows%20administrators%20to%20define%20policies%20for%20Office%20365%20ProPlus%20and%20assign%20these%20policies%20to%20users%20via%20Azure%20Active%20Directory%20security%20groups.%20Once%20defined%2C%20policies%20are%20automatically%20enforced%20as%20users%20sign%20in%20and%20use%20Office%20365%20ProPlus.%20No%20need%20to%20be%20domain%20joined%20or%20MDM%20enrolled%2C%20and%20it%20works%20with%20corporate-owned%20devices%20or%20BYOD.%20To%20learn%20more%20about%20Office%20cloud%20policy%20service%2C%20check%20out%20the%20announcement%20here%3A%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Focpsannouncement%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Focpsannouncement%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20also%20have%20a%20new%20service%20in%20public%20preview%20called%20Security%20Policy%20Advisor%20that%20can%20help%20you%20with%20deploying%20security%20policies.%20Security%20Policy%20Advisor%20can%20provide%20you%20with%20tailored%20recommendations%20for%20specific%20security%20policies%20based%20on%20how%20Office%20is%20used%20in%20your%20enterprise.%20For%20example%2C%20in%20most%20customer%20environments%2C%20macros%20are%20typically%20used%20in%20specific%20apps%20such%20as%20Excel%20and%20only%20by%20specific%20groups%20of%20users.%20Security%20Policy%20Advisor%20can%20help%20you%20identify%20groups%20of%20users%20and%20applications%20where%20macros%20can%20be%20disabled%20with%20minimal%20productivity%20impact%2C%20and%20optionally%20integrate%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Foffice365%2Fsecuritycompliance%2Foffice-365-atp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20365%20Advanced%20Threat%20P%3C%2FA%3E%3CSPAN%3Erotection%3C%2FSPAN%3Eto%20provide%20you%20information%20on%20who%20is%20being%20attacked.%20To%20learn%20more%20about%20Security%20Policy%20Advisor%2C%20check%20out%20the%20announcement%20here%3A%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fspaannouncement%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fspaannouncement%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-771308%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20draft%20release%20of%20the%20recommended%20security%20configuration%20baseline%20settings%20for%20Microsoft%20Office%20365%20ProPlus%2C%20version%201907.%20Highlights%20include%20componentization%20of%20GPOs%20so%20that%20%22challenging%22%20settings%20are%20grouped%20and%20treated%20as%20cohesive%20units%3B%20comprehensive%20blocking%20of%20legacy%20file%20formats%3B%20and%20blocking%20Excel%20from%20using%20DDE.%20The%20downloadable%20attachment%20includes%20GPOs%20that%20can%20be%20imported%20into%20AD%2C%20a%20script%20to%20apply%20the%20GPOs%20to%20local%20policy%2C%20documentation%2C%20and%20more.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-771308%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Esecurity%20baselines%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

[Update, 24 September 2019: final version of this baseline released and is now available as part of the Security Compliance Toolkit.]

 

Microsoft is pleased to announce the draft release of the recommended security configuration baseline settings for Microsoft Office 365 ProPlus, version 1907. Please evaluate this proposed baseline and send us your feedback through the Baselines Discussion site.

 

This baseline builds on the overhauled Office baseline we released in early 2018. The highlights of this baseline include:

  • Componentization of GPOs so that “challenging” settings can be added or removed as a unit.
  • Comprehensive blocking of legacy file formats
  • Blocking Excel from using Dynamic Data Exchange (DDE)

Also see the announcements at the end of this post regarding the new Security Policy Advisor and Office cloud policy services.

 

The downloadable attachment to this blog post includes importable GPOs, a script to apply the GPOs to local policy, a custom administrative template (ADMX) file for Group Policy settings, all the recommended settings in spreadsheet form and as Policy Analyzer rules. The recommended settings correspond with the Office 365 ProPlus administrative templates version 4888 released on July 17, 2019 that can be downloaded here. The download for the final version of this baseline will be released through the Security Compliance Toolkit.

 

Componentization of GPOs

Most organizations can implement most of the baseline’s recommended settings without any problems. However, there are a few settings that will cause operational issues for some organizations. We have broken out related groups of such settings into their own GPOs to make it easier for organizations to add or remove these restrictions as a set. The local-policy script, BaselineLocalInstall.ps1, offers command-line options to control whether these GPOs are installed.

The “MSFT Office 365 ProPlus 1907” GPO set includes “Computer” and “User” GPOs that represent the “core” settings that should be trouble free, and each of these potentially challenging GPOs, each of which is described later:

  • “Legacy File Block – User” is a User Configuration GPO that prevents Office applications from loading or saving legacy file formats.
  • “Require Macro Signing – User” is a User Configuration GPO that disables unsigned macros in each of the Office applications.
  • “Excel DDE Block – User” is a User Configuration GPO that blocks Excel from using DDE to search for existing DDE server processes or to start new ones.

 

Comprehensive blocking of legacy file formats

In the previous Office baseline we published, we tried to end the use of legacy file formats, including all the old Office document formats such as *.doc, *.xls, and *.ppt. However, we missed some important ones. So we just went ahead and fixed the glitch.

 

One of the threats of these old binary file formats is that their inherent complexity too often led to exploitable bugs in their parsers. The bigger threat is that many of these formats can include macros or other executable instructions that are easily abused. By contrast, macros are disabled with the most-commonly used Office Open XML (OOXML) document formats, which were first introduced with Office 2007. Only macro-enabled formats such as *.docm and *.xlsm support macros, and these can be filtered at the point of ingress.

 

While fixing the glitch, however, we also recognized that many organizations cannot entirely end their use of legacy Office document formats, so we broke out the file-blocking settings into a separate GPO, so they can be added or removed as a cohesive unit.

 

Blocking Excel from using DDE

Dynamic Data Exchange (DDE) is a very old interprocess communication method that is still used in some parts of Windows and remains supported for applications to use, primarily for backward compatibility. A few years ago, malware authors began embedding specially-formed DDE references in Office documents that were sent to victims and that would run attacker-chosen code. Since then, most Office apps quietly disabled the use of DDE. Excel retained user-configurable settings to enable DDE server process lookup and launch. These can now be configured through Group Policy, and this baseline recommends disabling both settings. Because of the likelihood that some organizations still depend on this functionality, we have broken out “Excel DDE Block” as a separate GPO.

 

Macro signing

The baseline also retains the “VBA Macro Notification Settings” options from our previous baselines that require that macros embedded in Office documents be signed by a trusted publisher. We recognize that some organizations have had workflows and processes relying on such macros for a long time, and that enforcing these particular settings can cause operational issues. It can also be challenging to identify all the documents and VBA projects that need to be signed. We have decided at this time to move these settings into a separate GPO to make it easier to switch the settings on or off without affecting the rest of the baseline.

 

Note that the “Block macros from running in Office files from the Internet” settings we turned on in the previous baseline are retained in the main GPOs and should be enforced by all security-conscious organizations.

 

Also see below about how the new Security Policy Advisor service can provide tailored recommendations for VBA macro policies.

 

Other changes in the baseline

  • “Block macros from running in Office files from the Internet” is now supported for Access, so we added it.
  • Implemented new settings to block the opening of certain untrusted files and to open others in Protected View.
  • Enabled the new “Macro Runtime Scan Scope” setting.
  • Removed the file block setting for “PowerPoint beta converters,” as Office no longer implements that block.

 

Deploy policies from the cloud, and get tailored recommendations for specific security policies

In addition to being able deploy these policies through Active Directory Group Policy or through Local Group Policy, you now have a new way to deploy user-based policies from the cloud to any Office 355 ProPlus client through the new Office cloud policy service.

 

The Office cloud policy service allows administrators to define policies for Office 365 ProPlus and assign these policies to users via Azure Active Directory security groups. Once defined, policies are automatically enforced as users sign in and use Office 365 ProPlus. No need to be domain joined or MDM enrolled, and it works with corporate-owned devices or BYOD. To learn more about Office cloud policy service, check out the announcement here: https://aka.ms/ocpsannouncement.

 

We also have a new service in public preview called Security Policy Advisor that can help you with deploying security policies. Security Policy Advisor can provide you with tailored recommendations for specific security policies based on how Office is used in your enterprise. For example, in most customer environments, macros are typically used in specific apps such as Excel and only by specific groups of users. Security Policy Advisor can help you identify groups of users and applications where macros can be disabled with minimal productivity impact, and optionally integrate with Office 365 Advanced Threat Protection to provide you information on who is being attacked. To learn more about Security Policy Advisor, check out the announcement here: https://aka.ms/spaannouncement.

2 Comments
Regular Visitor

Really nice summary and thank you for the templates!

Frequent Visitor

"Block macros from running in Office files from the Internet" is causing operational issues for the org I work for.

Probably it should not be in baseline until it works as expected.

It blocks macros for files that are opened from Trusted or Intranet sites. Another interesting finding is that it seems like this GPO will block macros in files saved and launched from INetCache folder, the folder where IE11 stores temp Internet files. Trusted or Intranet sites can store and open files from this location, and will be blocked. We have been seeing the issue mostly with IE11.

We would expect that macros in Excel files from Intranet or Trusted sites should not be blocked.