Microsoft Outlook 2013 STIG
Rules, Groups, and Values defined within the XCCDF Benchmark
-
DTOO104 - Disable user name and password
Group -
Disabling of user name and password syntax from being used in URLs must be enforced.
The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com. A malicious user might use this URL syntax to ...Rule Medium Severity -
Access restriction settings for published calendars must be configured.
Users can share their calendars with others by publishing them to the Microsoft Office Online Calendar Sharing Services and to a server that supports the World Wide Web Distributed Authoring and Ve...Rule Medium Severity -
IE Trusted Zones assumed trusted must be blocked.
Malicious users can send HTML email messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether specific recipients open the mes...Rule Medium Severity -
The Add-In Trust Level must be configured.
Under normal circumstances the installed COM add-ins are applications that have been approved and intentionally deployed by the organization and therefore they should not pose a security threat. H...Rule Medium Severity -
Object Model Prompt behavior for programmatic access of user address data must be configured.
If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentially change that data. This could result in mail being sent to the wrong pa...Rule Medium Severity -
Trusted add-ins behavior for email must be configured.
The Outlook object model includes entry points to access Outlook data, save data to specified locations, and send email messages, all of which can be used by malicious application developers. To he...Rule Medium Severity -
The prompt to display level 1 attachments must be disallowed when closing an item.
To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, to restrict access to files attached to email messages or other items. Po...Rule Medium Severity -
Junk Mail UI must be configured.
The Junk E-mail Filter in Outlook is designed to intercept the most obvious junk email, or spam, and send it to users' Junk E-mail folders. The filter evaluates each incoming message based on sever...Rule Medium Severity -
External content and pictures in HTML email must be displayed.
Malicious email senders can send HTML email messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether specific recipients open...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.