Skip to content

Microsoft Outlook 2010 STIG

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Active X One-Off forms must be configured.

    <VulnDiscussion>Third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Co...
    Rule Medium Severity
  • DTOO246 - Scripts in One-Off Forms

    <GroupDescription></GroupDescription>
    Group
  • Scripts in One-Off Outlook forms must be disallowed.

    &lt;VulnDiscussion&gt;Malicious code can be included within Outlook forms, and such code could be executed when users open the form. By default, O...
    Rule Medium Severity
  • DTOO273 - Block Trusted Zones

    <GroupDescription></GroupDescription>
    Group
  • IE Trusted Zones assumed 'trusted' must be blocked.

    &lt;VulnDiscussion&gt;Malicious users can send HTML e-mail messages with embedded Web beacons, which are pictures and other content from external s...
    Rule Medium Severity
  • DTOO236 - Add-In Trust Level

    <GroupDescription></GroupDescription>
    Group
  • The Add-In Trust Level must be configured.

    &lt;VulnDiscussion&gt;Under normal circumstances the installed COM add-ins are applications that have been approved and intentionally deployed by t...
    Rule Medium Severity
  • DTOO250 - Object Model Prompt for Address Book

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for programmatic address books must be configured.

    &lt;VulnDiscussion&gt;If an untrusted application accesses the address book, the application could gain access to sensitive data and potentially ch...
    Rule Medium Severity
  • DTOO241 - Demote Attachments to Level 2

    <GroupDescription></GroupDescription>
    Group
  • Action to demote an EMail Level 1 attachment to Level 2 must be configured.

    &lt;VulnDiscussion&gt;Outlook uses two levels of security to restrict access to files attached to e-mail messages or other items. Files with specif...
    Rule Medium Severity
  • DTOO254 - Object Model Prompt for Formula Property

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for accessing User Property Formula must be configured.

    &lt;VulnDiscussion&gt;A custom form in Outlook could be used to gain access to sensitive address book data and potentially to change that data. By ...
    Rule Medium Severity
  • Object Model Prompt behavior for the SaveAs method must be configured.

    &lt;VulnDiscussion&gt;If an untrusted application uses the Save As command to programmatically save an item, the application could add malicious da...
    Rule Medium Severity
  • DTOO251 - Object Model Prompt for Reading Address

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for programmatic access of user address data must be configured.

    &lt;VulnDiscussion&gt;If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentiall...
    Rule Medium Severity
  • DTOO252-Object Model Prompt for Meeting Response

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for Meeting and Task Responses must be configured.

    &lt;VulnDiscussion&gt;If an untrusted application programmatically responds to tasks or meeting requests, that application could impersonate a user...
    Rule Medium Severity
  • DTOO249 - Object Model Prmpt for auto email send

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt for programmatic email send behavior must be configured.

    &lt;VulnDiscussion&gt;If an untrusted application programmatically sends e-mail, that application could send mail that includes malicious code, imp...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules