Microsoft Office 365 ProPlus Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Extraction options must be blocked when opening corrupt Excel workbooks.
<VulnDiscussion>This policy setting controls whether Excel presents users with a list of data extraction options before beginning an Open and...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked.
<VulnDiscussion>This policy setting controls whether the specified Office 2016 applications notify users when unsigned application add-ins ar...Rule Medium Severity -
Updating of links in Excel must be prompted and not automatic.
<VulnDiscussion>This policy setting controls whether Excel prompts users to update automatic links, or whether the updates occur in the backg...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
Loading of pictures from Web pages not created in Excel must be disabled.
<VulnDiscussion>This policy setting controls whether Excel loads graphics when opening Web pages that were not created in Excel. It configure...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
AutoRepublish in Excel must be disabled.
<VulnDiscussion>This policy setting allows administrators to disable the AutoRepublish feature in Excel. If users choose to publish Excel dat...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
AutoRepublish warning alert in Excel must be enabled.
<VulnDiscussion>This policy setting allows administrators to disable the AutoRepublish feature in Excel. If users choose to publish Excel dat...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
The ability to run programs from PowerPoint must be disabled.
<VulnDiscussion>This policy setting controls the prompting and activation behavior for the "Run Programs" option for action buttons in PowerP...Rule Medium Severity -
File extensions must be enabled to match file types in Excel.
<VulnDiscussion>This policy setting controls how Excel loads file types that do not match their extension. Excel can load files with extensio...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Scan of encrypted macros in Excel Open XML workbooks must be enabled.
<VulnDiscussion>This policy setting controls whether encrypted macros in Open XML workbooks be are required to be scanned with anti-virus sof...Rule Medium Severity -
SRG-APP-000112
<GroupDescription></GroupDescription>Group -
File validation in Excel must be enabled.
<VulnDiscussion>This policy setting allows you turn off the file validation feature. If you enable this policy setting, file validation will...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.
<VulnDiscussion>This policy setting controls how Excel will warn users when WEBSERVICE functions are present. If you enable this policy sett...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Macros must be blocked from running in Excel files from the Internet.
<VulnDiscussion>This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this ...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
Untrusted Microsoft Query files must be blocked from opening in Excel.
<VulnDiscussion>This policy setting controls whether Microsoft Query files (.iqy, oqy, .dqy, and .rqy) in an untrusted location are prevented...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
Untrusted database files must be opened in Excel in Protected View mode.
<VulnDiscussion>This policy setting controls whether database files (.dbf) opened from an untrusted location are always opened in Protected V...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
Files from Internet zone must be opened in Excel in Protected View mode.
<VulnDiscussion>This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View. If you enable...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Files from unsafe locations must be opened in Excel in Protected View mode.
<VulnDiscussion>This policy setting lets you determine if files located in unsafe locations will open in Protected View. If you have not spec...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Files failing file validation must be opened in Excel in Protected view mode and disallow edits.
<VulnDiscussion>This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.
<VulnDiscussion>This policy setting controls whether scripts can run in Outlook forms in which the script and layout are contained within the...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
The Exchange client authentication with Exchange servers must be enabled to use Kerberos Password Authentication.
<VulnDiscussion>This policy setting controls which authentication method Outlook uses to authenticate with Microsoft Exchange Server. Note: E...Rule Medium Severity -
SRG-APP-000575
<GroupDescription></GroupDescription>Group -
Outlook must use remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers.
<VulnDiscussion>This policy setting controls whether Outlook uses remote procedure call (RPC) encryption to communicate with Microsoft Exchan...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Scripts associated with public folders must be prevented from execution in Outlook.
<VulnDiscussion>This policy setting controls whether Outlook executes scripts that are associated with custom forms or folder home pages for ...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Scripts associated with shared folders must be prevented from execution in Outlook.
<VulnDiscussion>This policy setting controls whether Outlook executes scripts associated with custom forms or folder home pages for shared fo...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Files dragged from an Outlook e-mail to the file system must be created in ANSI format.
<VulnDiscussion>This policy setting controls whether e-mail messages dragged from Outlook to the file system are saved in Unicode or ANSI for...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The junk email protection level must be set to No Automatic Filtering.
<VulnDiscussion>This policy setting controls the Junk E-mail protection level. The Junk E-mail Filter in Outlook helps to prevent junk email ...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Active X One-Off forms must only be enabled to load with Outlook Controls.
<VulnDiscussion>By default, third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so ...Rule Medium Severity -
SRG-APP-000340
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.