Skip to content

Microsoft Outlook 2013 STIG

Rules, Groups, and Values defined within the XCCDF Benchmark

  • DTOO271 - Auto Download from Safe lists

    <GroupDescription></GroupDescription>
    Group
  • Automatic download content for email in Safe Senders list must be disallowed.

    &lt;VulnDiscussion&gt;Malicious email senders can send HTML email messages with embedded Web beacons, or pictures and other content from external s...
    Rule Medium Severity
  • DTOO229 - Make Outlook the default program

    <GroupDescription></GroupDescription>
    Group
  • Outlook must be enforced as the default email, calendar, and contacts program.

    &lt;VulnDiscussion&gt;Outlook is made the default program for email, contacts, and calendar services when it is installed, although users can desig...
    Rule Medium Severity
  • DTOO260 - SMime message formats

    <GroupDescription></GroupDescription>
    Group
  • Message formats must be set to use SMime.

    &lt;VulnDiscussion&gt;Email typically travels over open networks and is passed from server to server. Messages are therefore vulnerable to intercep...
    Rule Medium Severity
  • DTOO268 - Missing Root Certificates

    <GroupDescription></GroupDescription>
    Group
  • Missing Root Certificates warning must be enforced.

    &lt;VulnDiscussion&gt;When Outlook accesses a certificate, it validates that it can trust the certificate by examining the root certificate of the ...
    Rule Medium Severity
  • DTOO239 - Outlook Security Mode

    <GroupDescription></GroupDescription>
    Group
  • Outlook Security Mode must be configured to use Group Policy settings.

    &lt;VulnDiscussion&gt;If users can configure security themselves, they might choose levels of security that leave their computers vulnerable to att...
    Rule Medium Severity
  • DTOO228 - Plain Text Options

    <GroupDescription></GroupDescription>
    Group
  • Plain Text Options for outbound email must be configured.

    &lt;VulnDiscussion&gt;If outgoing mail is formatted in certain ways, for example, if attachments are encoded in UUENCODE format, attackers might ma...
    Rule Medium Severity
  • DTOO217 - Prevent publishing to DAV Servers

    <GroupDescription></GroupDescription>
    Group
  • Publishing to a Web Distributed and Authoring (DAV) server must be prevented.

    &lt;VulnDiscussion&gt;Outlook users can share their calendars with others by publishing them to a server that supports the World Wide Web Distribut...
    Rule Medium Severity
  • DTOO216 - Publishing to Office Online

    <GroupDescription></GroupDescription>
    Group
  • Publishing calendars to Office Online must be prevented.

    &lt;VulnDiscussion&gt;Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Shar...
    Rule Medium Severity
  • DTOO238 - Prev't users customizing security set

    <GroupDescription></GroupDescription>
    Group
  • Users customizing attachment security settings must be prevented.

    &lt;VulnDiscussion&gt;All installed trusted COM addins can be trusted. Exchange settings for the addins still override if present and this option ...
    Rule Medium Severity
  • DTOO214 - Read EMail as plain text

    <GroupDescription></GroupDescription>
    Group
  • Read EMail as plain text must be enforced.

    &lt;VulnDiscussion&gt;Outlook can display email messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By default...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules