Hardening Ms Office

CMLew

Level 23
Thread author
Verified
Well-known
Oct 30, 2015
1,251
3,294
2,169
Singapore
I happened to read this article from Australia Govt site (?) related to cybersecurity. And one of them is hardening Ms. Office.

Wondered if anyone tried that?
 
I happened to read this article from Australia Govt site (?) related to cybersecurity. And one of them is hardening Ms. Office.

Wondered if anyone tried that?

Simple solution: AndyFul/Hard_Configurator
 
When on Windows 10
1. Install ConfigureDefender and enable all Windows Defender ASR rules
2. Open TrustCenter in Office and disable
- use of macro's
- use of active X
- use of Add-ins
- set trusted folders to your Documents (and data partitions)
3. Add all Office executables to Windows Defender Exploit protection and enable Code Integrity Guard
 
If you do not use H_C and ConfigureDefender, then you can tweak Office applications or use Windows Policies to:
  1. Disable macros (Word, Excel, PowerPoint, Access, Publisher, Outlook).
  2. Disable access to Visual Basic Object Model (Access, Excel, PowerPoint, Word).
  3. Disable auto-update for any linked fields (including DDE and OLE in Word, Excel, Outlook, OneNote).
  4. Disable ActiveX (Word, Excel, PowerPoint).
  5. Disable OLE (Word, Excel, PowerPoint).
  6. Disable ‘RunPrograms’ option for action buttons in PowerPoint.
  7. Disable automatic download of linked images in PowerPoint.
  8. Disable TrustBar notifications in (Word, Excel, PowerPoint).
All of this can be also done via Documents Anti-Exploit tool available on:
This tool uses most of the policies included in the :