About this baseline tool
Office 365 (Office 2016 / 16.0 policy paths)
Local, in-browser helper

Office 365 Baseline Script Assistant

This page explains what the Office 365 Baseline Script Assistant does, which controls it touches, and how to use the generated PowerShell script safely on Windows systems that run Office 2016 style Microsoft 365 Apps. The assistant builds a single script with Invoke-O365Baseline and Invoke-O365BaselineRollback functions so you can apply and attempt to undo its changes in a controlled way. :contentReference[oaicite:0]{index=0}

What this assistant is designed to do

The Office 365 Baseline Script Assistant is a local-only helper that builds a PowerShell script for registry based Office hardening. It follows a STIG style approach and focuses on protections that are useful for home users, solo professionals, and small environments.

  • Targets Office 16.0 policy registry paths for Microsoft 365 Apps on Windows.
  • Lets you pick individual controls or start from Relaxed, Strict, or Custom profiles.
  • Builds one script that you can review, version, and run on your own schedule.
  • Includes a companion rollback function that attempts to remove keys the script created.
Macros and VBA safety Legacy IE and ActiveX protections Privacy and connected experiences

Nothing is sent back to CyberLife Coach, to Microsoft, or to any third party. All selection logic and script generation happens in your browser tab.

How to use the generated script

The assistant produces a complete script that defines Invoke-O365Baseline and Invoke-O365BaselineRollback. You decide when to run either function.

  • Open the tool, choose Relaxed, Strict, or Custom, then select the controls you want.
  • Select “Generate PowerShell script” and copy or download the output.
  • Save it as a file, for example office365-baseline.ps1.
  • Right click PowerShell, choose “Run as administrator,” then run:
    .\office365-baseline.ps1
  • Apply the controls when you are ready by running:
    Invoke-O365Baseline
  • If you need to undo what this script did for supported keys, run:
    Invoke-O365BaselineRollback

Always test on a non critical machine first and take a snapshot or backup of your configuration before you make changes in a production environment.

Which protections this baseline can enforce

The assistant focuses on a concise set of registry based controls that are broadly useful for individuals and small environments. The exact registry blocks are visible inside the generated script so you can adjust, comment, or extend them.

Relaxed profile

  • Blocks macros in Office files from the Internet for Access.
  • Enables VBA macro runtime scanning for all documents so AV has better context.
  • Requires digitally signed macros in Excel by setting vbawarnings = 3.
  • Disables connected experiences that automatically download online content.
  • Disables additional optional connected experiences for better privacy posture.

Relaxed is designed as a sensible baseline for most home users and solo professionals, since it adds meaningful protection while keeping core Office functions usable.

Strict profile

  • Includes everything in Relaxed.
  • Turns on Local Machine Zone lockdown for common Office executables.
  • Enables object caching protection for Office when hosted by IE components.
  • Enables zone elevation protection to reduce silent jumps between zones.
  • Restricts ActiveX installation in Office host contexts.
  • Enforces scripted window security restrictions to reduce spoofing risk.

Strict is aimed at hardened builds where legacy intranet apps and older ActiveX based add-ins are either not used or can be safely retired.

Before you roll this out widely

  • Confirm that you are allowed to modify Office policy keys on the devices in scope.
  • Export relevant registry branches or take a full system backup before testing.
  • Read through the generated script so every registry path and value makes sense.
  • Check for overlap with existing Group Policy or MDM baselines from your employer.
  • Apply and evaluate on a single, non critical machine before using it anywhere else.

Good next steps

  • Store your adjusted baseline script in version control or a secure admin repository.
  • Document which controls you enabled, why you chose them, and how to reverse them.
  • Revisit this baseline whenever your Office channel, add ins, or browser integrations change.
  • Pair this Office hardening with host baselines such as Windows 11, browser, and firewall tools.

This tool includes a curated subset of DISA STIG controls selected for real world use by home users, entrepreneurs, digital nomads, and small businesses. It is not a full STIG implementation but a practical baseline designed to reduce your attack surface.

Important notice & Legal disclaimer
This assistant and the generated script are provided for educational and informational use only. They do not replace professional advice and they do not guarantee compliance with DISA STIGs, NIST CSF, or any other framework. All logic runs locally in your browser and the output script stays on your system, yet you are fully responsible for how you use it. Always test in a safe environment, verify every line, and make sure you have reliable backups and recovery plans before applying changes. Do not run this baseline on employer or school managed devices without explicit written approval from whoever owns those environments.