DTOO123 - Navigation to URLs embedded in Office products must be blocked.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a web page). If Internet Explorer attempts to load a malformed URL, a security risk could occur.


Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security 'Navigate URL' to 'Enabled' and place a check in the 'outlook.exe' check box.

See Also


Item Details


References: 800-53|CM-6, CAT|II, CCI|CCI-001170, CSCv6|3.1, Rule-ID|SV-228422r508021_rule, STIG-ID|DTOO123, STIG-Legacy|SV-85739, STIG-Legacy|V-71115, Vuln-ID|V-228422

Plugin: Windows

Control ID: 709d051c2b7befd526a1f7ce6fb4e8586b2c1005642b7cd6fad303e5727e8b08