Microsoft Office 365 ProPlus STIG Ver 2, Rel 3 Checklist Details (Checklist Revisions)

Supporting Resources:


Target CPE Name
Microsoft Office 365 ProPlus cpe:/a:microsoft:office_365_proplus:- (View CVEs)

Checklist Highlights

Checklist Name:
Microsoft Office 365 ProPlus STIG
Checklist ID:
Ver 2, Rel 3
Review Status:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:

Checklist Summary:

Office 365 ProPlus is the full version of Office that is installed on a user’s local computer and runs locally. System requirements are similar to prior Office versions. Office 365 ProPlus uses the Click-to-Run installation technology and by default installs as one package. However, it can be configured to exclude or remove certain Office 365 ProPlus products from client computers. Many of the same tools used to deploy and configure previous Office versions are used for Office 365 ProPlus. The Microsoft Office 365 ProPlus Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the Office 365 ProPlus application, as installed on a user’s local computer. This document is intended to improve the security of Department of Defense (DoD) information systems. Individual STIGs for each Office application program will not be created; instead, all requirements for all Office application programs will be included in this one STIG.

Checklist Role:

  • Office Software

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Instruction (DoDI) 8500.01


Comments or proposed revisions to this document should be sent via email to the following address: DISA will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.


Not provided.

Product Support:

Parties within the DoD and Federal Government’s computing environments can obtain the applicable STIG from the Cyber Exchange website at This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DoD Certificates can obtain the STIG from

Point of Contact:


Not provided.


Not provided.

Change History:

updated to FINAL - 5/26/2020
updated GPO file per DISA - 7/7/2020
updated URLs - 8/3/2020
Added GPO file per DISA - 8/5/2020
Updated URL per DISA - 10/28/20
updated SHA - 11/5/2020
Updated GPO - 12/4/2020
Updated GPO per DISA - 1/28/21
Updated GPO per DISA - 3/1/21
updated URL per DISA - 4/28/2021
Updated GPO per DISA - 5/12/21
Updated resource per DISA - 7/29/21
Updated GPO - 8/9/21
Updated GPO per DISA - 8/24/21


URL Description


Reference URL Description

NIST checklist record last modified on 08/24/2021