Microsoft Office 365 ProPlus STIG Ver 3, Rel 3 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Microsoft Office 365 ProPlus STIG - Ver 2, Rel 5
- Defense Information Systems Agency
-
Download GPOs - Group Policy Objects (GPOs) - April 2022
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Microsoft Office 365 ProPlus | cpe:/a:microsoft:office_365_proplus:- (View CVEs) |
Checklist Highlights
- Checklist Name:
- Microsoft Office 365 ProPlus STIG
- Checklist ID:
- 953
- Version:
- Ver 3, Rel 3
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 03/20/2020
Checklist Summary:
Office 365 ProPlus is the full version of Office that is installed on a user’s local computer and runs locally. System requirements are similar to prior Office versions. Office 365 ProPlus uses the Click-to-Run installation technology and by default installs as one package. However, it can be configured to exclude or remove certain Office 365 ProPlus products from client computers. Many of the same tools used to deploy and configure previous Office versions are used for Office 365 ProPlus. The Microsoft Office 365 ProPlus Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the Office 365 ProPlus application, as installed on a user’s local computer. This document is intended to improve the security of Department of Defense (DoD) information systems. Individual STIGs for each Office application program will not be created; instead, all requirements for all Office application programs will be included in this one STIG.
Checklist Role:
- Office Software
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD Instruction (DoDI) 8500.01
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.
Disclaimer:
Not provided.
Product Support:
Parties within the DoD and Federal Government’s computing environments can obtain the applicable STIG from the Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DoD Certificates can obtain the STIG from https://public.cyber.mil/.
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
updated to FINAL - 5/26/2020 updated GPO file per DISA - 7/7/2020 updated URLs - 8/3/2020 Added GPO file per DISA - 8/5/2020 Updated URL per DISA - 10/28/20 updated SHA - 11/5/2020 Updated GPO - 12/4/2020 Updated GPO per DISA - 1/28/21 Updated GPO per DISA - 3/1/21 updated URL per DISA - 4/28/2021 Updated GPO per DISA - 5/12/21 Updated resource per DISA - 7/29/21 Updated GPO - 8/9/21 null Updated GPO per DISA - 8/24/21 updated GPO files - 11/22/2021 updated URLs - 1/26/2022 Updated GPO per DISA - 2/17/22 Updated resource per DISA - 4/24/22 Updated GPO per DISA - 5/2/22 null
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|