Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/juju4/ansible-win-msoffice
Configure MsOffice security with ansible
https://github.com/juju4/ansible-win-msoffice
Last synced: 12 days ago
JSON representation
Configure MsOffice security with ansible
- Host: GitHub
- URL: https://github.com/juju4/ansible-win-msoffice
- Owner: juju4
- License: bsd-2-clause
- Created: 2018-02-26T01:07:09.000Z (almost 7 years ago)
- Default Branch: main
- Last Pushed: 2023-08-05T16:50:17.000Z (over 1 year ago)
- Last Synced: 2024-11-07T17:40:49.159Z (2 months ago)
- Language: PowerShell
- Size: 74.2 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
[![Appveyor - Master](https://ci.appveyor.com/api/projects/status/m0qj12g9niyr86yo/branch/master?svg=true)](https://ci.appveyor.com/project/juju4/ansible-win-msoffice/branch/master)
[![Appveyor - Devel](https://ci.appveyor.com/api/projects/status/m0qj12g9niyr86yo/branch/devel?svg=true)](https://ci.appveyor.com/project/juju4/ansible-win-msoffice/branch/devel)# MsOffice security ansible role
Ansible role to setup MsOffice security on Windows system.
## Requirements & Dependencies
### Ansible
It was tested on the following versions:
* 2.3
* 2.4
* 2.5b2
* 4.10.0
* 5.3.0### Operating systems
Tested in Appveyor
## Example Playbook
Just include this role in your list.
For example```
- host: all
roles:
- juju4.win_msoffice
```Run
```
$ ansible -i inventory -m win_ping win --ask-pass
$ ansible-playbook -i inventory --limit win site.yml
```## Variables
See defaults/main.yml for full scope
## Continuous integration
This role has a travis basic test (for github, syntax check only), Appveyor test and a Vagrantfile (test/vagrant).
```
$ cd /path/to/roles/juju4.win_msoffice/test/vagrant
$ vagrant up
$ vagrant provision
$ vagrant destroy
$ ansible -i .vagrant/provisioners/ansible/inventory/vagrant_ansible_inventory -m win_ping -e ansible_winrm_server_cert_validation=ignore -e ansible_ssh_port=55986 all
```## Troubleshooting & Known issues
## FAQ
Reference links
* https://www.asd.gov.au/publications/protect/hardening-ms-office-2016.htm
* https://www.asd.gov.au/publications/protect/ms-office-macro-security.htm
* http://www.asd.gov.au/publications/protect/Microsoft_Office_Macro_Security.pdf
* https://blogs.technet.microsoft.com/mmpc/2016/03/22/new-feature-in-office-2016-can-block-macros-and-help-prevent-infection/
* https://technet.microsoft.com/en-us/library/cc179076.aspx ActiveX in Office
* https://technet.microsoft.com/en-us/library/cc179039.aspx
* https://doublepulsar.com/oleoutlook-bypass-almost-every-corporate-security-control-with-a-point-n-click-gui-37f4cbc107d0
* https://blogs.technet.microsoft.com/mmpc/2016/06/14/wheres-the-macro-malware-author-are-now-using-ole-embedding-to-deliver-malicious-files/
* https://www.endgame.com/blog/technical-blog/bug-feature-debate-back-yet-again-ddeauto-root-cause-analysis
* https://blog.barkly.com/microsoft-office-malware-attack-no-macros
* https://gist.github.com/wdormann/732bb88d9b5dd5a66c9f1e1498f31a1b
* https://technet.microsoft.com/en-us/library/security/4053440
* https://blogs.technet.microsoft.com/diana_tudor/2014/12/02/microsoft-project-how-to-control-macro-settings-using-registry-keys/* Signing Office/Macros files
* https://www.howto-outlook.com/howto/selfcert.htm
* https://support.office.com/en-us/article/digitally-sign-your-macro-project-956e9cc8-bbf6-4365-8bfa-98505ecd1c01
* https://www.techrepublic.com/article/how-to-create-a-self-signed-digital-certificate-for-vba-macros-in-office-365/## License
BSD 2-clause