Microsoft Outlook 2010 STIG
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Check e-mail addresses against addresses of certificates being used must be disallowed.
<VulnDiscussion>This policy setting controls whether Outlook verifies the user's e-mail address with the address associated with the certific...Rule Medium Severity -
DTOO425 - Disable Internet and network path into hyperlinks
<GroupDescription></GroupDescription>Group -
DTOO253 - Object Model Prompt for Save As
<GroupDescription></GroupDescription>Group -
DTOO104 - Disable user name and password
<GroupDescription></GroupDescription>Group -
Disable user name and password syntax from being used in URLs
<VulnDiscussion>The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://usern...Rule Medium Severity -
DTOO111 - Enable IE Bind to Object
<GroupDescription></GroupDescription>Group -
Enabling IE Bind to Object functionality must be present.
<VulnDiscussion>Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control...Rule Medium Severity -
DTOO117 - Saved from URL
<GroupDescription></GroupDescription>Group -
Saved from URL mark to assure Internet zone processing must be enforced.
<VulnDiscussion>Typically, when Internet Explorer loads a Web page from a Universal Naming Convention (UNC) share that contains a Mark of the...Rule Medium Severity -
DTOO123-Block Navigation to URL from Office
<GroupDescription></GroupDescription>Group -
Navigation to URL's embedded in Office products must be blocked.
<VulnDiscussion>To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be c...Rule Medium Severity -
DTOO129 - Block Pop-Ups
<GroupDescription></GroupDescription>Group -
Links that invoke instances of IE from within an Office product must be blocked.
<VulnDiscussion>The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearin...Rule Medium Severity -
DTOO272 - Content download from safe zones
<GroupDescription></GroupDescription>Group -
Permit download of content from safe zones must be configured.
<VulnDiscussion>By default, Outlook automatically downloads content from sites that are considered "safe," as defined in the Security tab of ...Rule Medium Severity -
DTOO219 - Access to Published Calendars
<GroupDescription></GroupDescription>Group -
Access restriction settings for published calendars must be configured.
<VulnDiscussion>Users can share their calendars with others by publishing them to the Microsoft Office Online Calendar Sharing Services and t...Rule Medium Severity -
DTOO224 - Email Recipient to Safe Sender List
<GroupDescription></GroupDescription>Group -
Recipients of sent email must be unable to be added to the safe sender's list.
<VulnDiscussion>Users could send e-mail messages to request that they be taken off a mailing list. If the e-mail recipient is then automatica...Rule Medium Severity -
DTOO234 - Active X One-Off Forms
<GroupDescription></GroupDescription>Group -
Active X One-Off forms must be configured.
<VulnDiscussion>Third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Co...Rule Medium Severity -
DTOO246 - Scripts in One-Off Forms
<GroupDescription></GroupDescription>Group -
Scripts in One-Off Outlook forms must be disallowed.
<VulnDiscussion>Malicious code can be included within Outlook forms, and such code could be executed when users open the form. By default, O...Rule Medium Severity -
DTOO273 - Block Trusted Zones
<GroupDescription></GroupDescription>Group -
IE Trusted Zones assumed 'trusted' must be blocked.
<VulnDiscussion>Malicious users can send HTML e-mail messages with embedded Web beacons, which are pictures and other content from external s...Rule Medium Severity -
DTOO236 - Add-In Trust Level
<GroupDescription></GroupDescription>Group -
The Add-In Trust Level must be configured.
<VulnDiscussion>Under normal circumstances the installed COM add-ins are applications that have been approved and intentionally deployed by t...Rule Medium Severity -
DTOO250 - Object Model Prompt for Address Book
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for programmatic address books must be configured.
<VulnDiscussion>If an untrusted application accesses the address book, the application could gain access to sensitive data and potentially ch...Rule Medium Severity -
DTOO241 - Demote Attachments to Level 2
<GroupDescription></GroupDescription>Group -
Action to demote an EMail Level 1 attachment to Level 2 must be configured.
<VulnDiscussion>Outlook uses two levels of security to restrict access to files attached to e-mail messages or other items. Files with specif...Rule Medium Severity -
DTOO254 - Object Model Prompt for Formula Property
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for accessing User Property Formula must be configured.
<VulnDiscussion>A custom form in Outlook could be used to gain access to sensitive address book data and potentially to change that data. By ...Rule Medium Severity -
Object Model Prompt behavior for the SaveAs method must be configured.
<VulnDiscussion>If an untrusted application uses the Save As command to programmatically save an item, the application could add malicious da...Rule Medium Severity -
DTOO251 - Object Model Prompt for Reading Address
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for programmatic access of user address data must be configured.
<VulnDiscussion>If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentiall...Rule Medium Severity -
DTOO252-Object Model Prompt for Meeting Response
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for Meeting and Task Responses must be configured.
<VulnDiscussion>If an untrusted application programmatically responds to tasks or meeting requests, that application could impersonate a user...Rule Medium Severity -
DTOO249 - Object Model Prmpt for auto email send
<GroupDescription></GroupDescription>Group -
Object Model Prompt for programmatic email send behavior must be configured.
<VulnDiscussion>If an untrusted application programmatically sends e-mail, that application could send mail that includes malicious code, imp...Rule Medium Severity -
DTOO256 - Trusted Add-Ins Security
<GroupDescription></GroupDescription>Group -
Trusted add-ins behavior for eMail must be configured.
<VulnDiscussion>The Outlook object model includes entry points to access Outlook data, save data to specified locations, and send e-mail mess...Rule Medium Severity -
DTOO226 - Dial-up Options
<GroupDescription></GroupDescription>Group -
Dial-up and Hang up Options for Outlook must be configured.
<VulnDiscussion>By default, users can connect to their e-mail servers using dial-up networking if their accounts are configured appropriately...Rule Medium Severity -
DTOO225 - Warn before Switching Dial-up
<GroupDescription></GroupDescription>Group -
Outlook Dial-up options to Warn user before allowing switch in dial-up access must be configured.
<VulnDiscussion>Users can connect to their e-mail servers using dial-up networking if their accounts are configured appropriately. Dial-up co...Rule Medium Severity -
DTOO237-Disable "remember password" on eMail Accts
<GroupDescription></GroupDescription>Group -
The "remember password" for internet e-mail accounts must be disabled.
<VulnDiscussion>As a security precaution, password caching for eMail Internet protocols such as POP3 or IMAP may lead to password discovery a...Rule Medium Severity -
DTOO243 - Level 1 Attachment prompt
<GroupDescription></GroupDescription>Group -
Level 1 attachment close behaviors must be configured.
<VulnDiscussion>To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.