Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/juju4/ansible-win-msoffice

Configure MsOffice security with ansible
https://github.com/juju4/ansible-win-msoffice

Last synced: 12 days ago
JSON representation

Configure MsOffice security with ansible

Awesome Lists containing this project

README

        

[![Appveyor - Master](https://ci.appveyor.com/api/projects/status/m0qj12g9niyr86yo/branch/master?svg=true)](https://ci.appveyor.com/project/juju4/ansible-win-msoffice/branch/master)
[![Appveyor - Devel](https://ci.appveyor.com/api/projects/status/m0qj12g9niyr86yo/branch/devel?svg=true)](https://ci.appveyor.com/project/juju4/ansible-win-msoffice/branch/devel)

# MsOffice security ansible role

Ansible role to setup MsOffice security on Windows system.

## Requirements & Dependencies

### Ansible
It was tested on the following versions:
* 2.3
* 2.4
* 2.5b2
* 4.10.0
* 5.3.0

### Operating systems

Tested in Appveyor

## Example Playbook

Just include this role in your list.
For example

```
- host: all
roles:
- juju4.win_msoffice
```

Run
```
$ ansible -i inventory -m win_ping win --ask-pass
$ ansible-playbook -i inventory --limit win site.yml
```

## Variables

See defaults/main.yml for full scope

## Continuous integration

This role has a travis basic test (for github, syntax check only), Appveyor test and a Vagrantfile (test/vagrant).

```
$ cd /path/to/roles/juju4.win_msoffice/test/vagrant
$ vagrant up
$ vagrant provision
$ vagrant destroy
$ ansible -i .vagrant/provisioners/ansible/inventory/vagrant_ansible_inventory -m win_ping -e ansible_winrm_server_cert_validation=ignore -e ansible_ssh_port=55986 all
```

## Troubleshooting & Known issues

## FAQ

Reference links
* https://www.asd.gov.au/publications/protect/hardening-ms-office-2016.htm
* https://www.asd.gov.au/publications/protect/ms-office-macro-security.htm
* http://www.asd.gov.au/publications/protect/Microsoft_Office_Macro_Security.pdf
* https://blogs.technet.microsoft.com/mmpc/2016/03/22/new-feature-in-office-2016-can-block-macros-and-help-prevent-infection/
* https://technet.microsoft.com/en-us/library/cc179076.aspx ActiveX in Office
* https://technet.microsoft.com/en-us/library/cc179039.aspx
* https://doublepulsar.com/oleoutlook-bypass-almost-every-corporate-security-control-with-a-point-n-click-gui-37f4cbc107d0
* https://blogs.technet.microsoft.com/mmpc/2016/06/14/wheres-the-macro-malware-author-are-now-using-ole-embedding-to-deliver-malicious-files/
* https://www.endgame.com/blog/technical-blog/bug-feature-debate-back-yet-again-ddeauto-root-cause-analysis
* https://blog.barkly.com/microsoft-office-malware-attack-no-macros
* https://gist.github.com/wdormann/732bb88d9b5dd5a66c9f1e1498f31a1b
* https://technet.microsoft.com/en-us/library/security/4053440
* https://blogs.technet.microsoft.com/diana_tudor/2014/12/02/microsoft-project-how-to-control-macro-settings-using-registry-keys/

* Signing Office/Macros files
* https://www.howto-outlook.com/howto/selfcert.htm
* https://support.office.com/en-us/article/digitally-sign-your-macro-project-956e9cc8-bbf6-4365-8bfa-98505ecd1c01
* https://www.techrepublic.com/article/how-to-create-a-self-signed-digital-certificate-for-vba-macros-in-office-365/

## License

BSD 2-clause