Block Word 2.x and earlier binary files (.doc format from 1980s-1990s) - ANCIENT formats met unpatched vulnerabilities + zero business use.
Aanbeveling
IMPLEMENT
Risico zonder
Medium
Risk Score
4/10
Implementatie
2u (tech: 1u)
Van toepassing op:
β Microsoft Word
Word 2.x = ANCIENT (1987-1993): Format age: 30+ years old (pre-internet era), Vulnerabilities: Buffer overflows, memory corruption (no modern mitigations), Patches: NONE (Microsoft stopped support 20+ years ago), Attack vector: Malicious Word 2.x file β exploit ancient parser β code execution. Business use: ZERO (who has Word 2.x documents from 1990?). Modern Word: Opens .docx (2007+), NOT ancient .doc variants.
Block Word 2.x binary: File types: .doc (Word 2.0), .dot (Word 2.0 templates), Earlier: Word 1.x, Action: Block open + save (cannot open these files), User message: 'File format blocked by administrator', Zero business impact: No modern organization uses Word 2.x files.
Vereisten
Word 2016+
Intune of GPO
Implementatie
Intune Settings Catalog: Word\Security\Trust Center\File Block Settings β Word 2 and earlier binary documents and templates: Block (Open + Save).
Compliance
DISA STIG Office, BIO 12.02 (Block legacy formats), CIS Office Benchmark.
Monitoring
Gebruik PowerShell-script word2-earlier-binary-blocked.ps1 (functie Invoke-Monitoring) β Controleren.
Remediatie
Gebruik PowerShell-script word2-earlier-binary-blocked.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
BIO: 12.02.01 -
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).