Skip to content

Microsoft Outlook 2013 STIG

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Retrieving of CRL data must be set for online action.

    This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Certificate revocation lists (CRLs) are lists of digital certificates that h...
    Rule Medium Severity
  • DTOO262 - FIPS compliant mode

    Group
  • DTOO257 - No S/Mime interop w/ external clients

    Group
  • DTOO266 - S/Mime receipt requests

    Group
  • Automatic sending s/Mime receipt requests must be disallowed.

    Incoming signed or encrypted messages might include S/MIME receipt requests. S/MIME receipts provide confirmation that messages are received unaltered, and can include information about who opened ...
    Rule Medium Severity
  • DTOO276 - Security settings for macros

    Group
  • Always warn on untrusted macros must be enforced.

    To protect users from dangerous code, the Outlook default configuration disables all macros that are not trusted, including unsigned macros, macros with expired or invalid signatures, and macros wi...
    Rule Medium Severity
  • DTOO264 - Clear signed messages

    Group
  • Send all signed messages as clear signed messages must be configured.

    When users sign email messages with their signing certificate and send them, Outlook uses the sender's private key to encrypt the digital signature but sends the messages as clear text, unless they...
    Rule Medium Severity
  • DTOO247 - Custom OOM Action Exe. Prompt

    Group
  • Custom Outlook Object Model (OOM) action execution prompts must be configured.

    Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom actions can be created that reply to messages in ways that circumvent the ...
    Rule Medium Severity
  • DTOO265 - Signature Warnings

    Group
  • DTOO223 - Trust EMail from Contacts

    Group
  • Trust EMail from senders in receivers contact list must be enforced.

    Email addresses in users' Contacts list are treated as safe senders for purposes of filtering junk email. If this configuration is changed, email from users' Contacts might be misclassified as junk...
    Rule Medium Severity
  • DTOO282 - RSS Feeds

    Group
  • RSS Feeds must be disallowed.

    Users can subscribe to RSS feeds from within Outlook and read RSS items like email messages. If an organization has policies that govern the use of external resources such as RSS feeds, allowing us...
    Rule Medium Severity
  • DTOO231 - Unicode use when dragging Email

    Group
  • Dragging Unicode email messages to file system must be disallowed.

    When users drag email messages from Outlook to a Windows Explorer window or to their Desktop, Outlook creates an .msg file using the native character encoding format for the configured locale (the ...
    Rule Medium Severity
  • DTOO286 - Disable User Entries to Server list

    Group
  • User Entries to Server List must be disallowed.

    If users are able to manually enter the addresses of servers that are not approved by the organization, they could use servers that do not meet your organization's information security requirements...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules