Skip to content

Microsoft Office 365 ProPlus Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000630

    <GroupDescription></GroupDescription>
    Group
  • The minimum encryption key length in Outlook must be at least 168.

    &lt;VulnDiscussion&gt;This policy setting allows you to set the minimum key length for an encrypted e-mail message. If you enable this policy sett...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • The warning about invalid digital signatures must be enabled to warn Outlook users.

    &lt;VulnDiscussion&gt;This policy setting controls how Outlook warns users about messages with invalid digital signatures. If you enable this poli...
    Rule Medium Severity
  • SRG-APP-000605

    <GroupDescription></GroupDescription>
    Group
  • Outlook must be configured to allow retrieving of Certificate Revocation Lists (CRLs) always when online.

    &lt;VulnDiscussion&gt;This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Certi...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.

    &lt;VulnDiscussion&gt;This policy setting controls which set of security settings are enforced in Outlook. If you enable this policy setting, you c...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • The ability to demote attachments from Level 2 to Level 1 must be disabled.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook users can demote attachments to Level 2 by using a registry key, which will allo...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • The display of Level 1 attachments must be disabled in Outlook.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook blocks potentially dangerous attachments designated Level 1. Outlook uses two le...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Level 1 file attachments must be blocked from being delivered.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook users can demote attachments to Level 2 by using a registry key, which will allo...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Files located in unsafe locations must be opened in Protected view in Word.

    &lt;VulnDiscussion&gt;This policy setting lets you determine if files located in unsafe locations will open in Protected View. If you have not spec...
    Rule Medium Severity
  • Level 2 file attachments must be blocked from being delivered.

    &lt;VulnDiscussion&gt;This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.

    &lt;VulnDiscussion&gt;This policy setting controls whether scripts can run in Outlook forms in which the script and layout are contained within the...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • When a custom action is executed that uses the Outlook object model, Outlook must automatically deny it.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook prompts users before executing a custom action. Custom actions add functionality...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to gain access to an Address Book using the Outl...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when a user designs a custom form in Outlook and attempts to bind an Address Inform...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • When an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically s...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outloo...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Outlook must be configured to not allow hyperlinks in suspected phishing messages.

    &lt;VulnDiscussion&gt;This policy setting controls whether hyperlinks in suspected phishing e-mail messages in Outlook are allowed. If you enable t...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.

    &lt;VulnDiscussion&gt;This policy setting controls the security level for macros in Outlook. If you enable this policy setting, you can choose fr...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Trusted Locations on the network must be disabled in Project.

    &lt;VulnDiscussion&gt;This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users ...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • Project must automatically disable unsigned add-ins without informing users.

    &lt;VulnDiscussion&gt;This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are lo...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • VBA Macros not digitally signed must be blocked in Project.

    &lt;VulnDiscussion&gt;This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are pr...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • VBA Macros not digitally signed must be blocked in PowerPoint.

    &lt;VulnDiscussion&gt;This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are pr...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • The ability to run programs from PowerPoint must be disabled.

    &lt;VulnDiscussion&gt;This policy setting controls the prompting and activation behavior for the "Run Programs" option for action buttons in PowerP...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules