O365-CO-000016 - User name and password must be disabled in all Office programs

Information

The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:[email protected]. A malicious user might use this URL syntax to create a hyperlink that appears to open a legitimate website but actually opens a deceptive (spoofed) website. For example, the URL http://[email protected] appears to open http://www.wingtiptoys.com but actually opens http://example.com. To protect users from such attacks, Internet Explorer usually blocks any URLs using this syntax.

Solution

Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security 'Disable user name and password' to 'Enabled' and select the check boxes for all installed Office programs.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Office_365_ProPlus_V2R11_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-18(4), CAT|II, CCI|CCI-001170, Rule-ID|SV-223298r879630_rule, STIG-ID|O365-CO-000016, STIG-Legacy|SV-108775, STIG-Legacy|V-99671, Vuln-ID|V-223298

Plugin: Windows

Control ID: 5c32bb5d33ae8d329200d1b07586d86f173085d8a8dcf9ce6c16c0170b5eeb97