Microsoft Office 365 ProPlus Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
When an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically s...Rule Medium Severity -
When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outloo...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Outlook must be configured to not allow hyperlinks in suspected phishing messages.
<VulnDiscussion>This policy setting controls whether hyperlinks in suspected phishing e-mail messages in Outlook are allowed. If you enable t...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.
<VulnDiscussion>This policy setting controls the security level for macros in Outlook. If you enable this policy setting, you can choose fr...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Trusted Locations on the network must be disabled in Project.
<VulnDiscussion>This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users ...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
Project must automatically disable unsigned add-ins without informing users.
<VulnDiscussion>This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are lo...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
VBA Macros not digitally signed must be blocked in Project.
<VulnDiscussion>This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are pr...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
VBA Macros not digitally signed must be blocked in PowerPoint.
<VulnDiscussion>This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are pr...Rule Medium Severity -
Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.
<VulnDiscussion>This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format spec...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.