Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • DTOO168 - Sending templates with email form

    Group
  • Disabling sending form templates with the email forms must be configured.

    InfoPath allows users to attach form templates when sending email forms. If users are able to open form templates included with email forms, rather than using a cached version that is previously pu...
    Rule Medium Severity
  • DTOO170 - 2003 forms as email

    Group
  • InfoPath 2003 forms as email forms in InfoPath 2013 must be disallowed.

    An attacker might target InfoPath 2003 forms to try and compromise an organization's security. InfoPath 2003 did not write a published location for email forms, which means forms could open without...
    Rule Medium Severity
  • DTOO164 - Beaconing UI / forms opening

    Group
  • Beaconing UI shown for opened forms must be configured.

    Malicious users can create InfoPath forms with embedded Web beacons that can be used to contact an external server when the user opens the form. Information could be gathered by the form, or inform...
    Rule Medium Severity
  • DTOO165 - Beaconing UI /forms opened Activex

    Group
  • Beaconing of UI forms with ActiveX controls must be enforced.

    InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a web beacon into one o...
    Rule Medium Severity
  • DTOO156 - Offline Mode Cache

    Group
  • Offline Mode capability to cache queries for offline mode must be configured.

    InfoPath can function in online mode or offline mode. It can also cache queries for use in offline mode. If offline mode is used and cached queries are enabled, sensitive information contained in t...
    Rule Medium Severity
  • DTOO160 - Unsafe File Attachments in InfoPath

    Group
  • Unsafe file types must be prevented from being attached to InfoPath forms.

    Users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath disallows by default...
    Rule Medium Severity
  • DTOO127 - Add-ins are signed by Trusted Publisher

    Group
  • Add-ins to Office applications must be signed by a Trusted Publisher.

    Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-i...
    Rule Medium Severity
  • DTOO294 - E-mail forms from the Intranet

    Group
  • InfoPath must be enforced to not use email forms from the Intranet security zone.

    InfoPath email forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default, for...
    Rule Medium Severity
  • DTOO295 - InfoPath e-mail forms in Outlook

    Group
  • InfoPath email forms in Outlook must be disallowed.

    Attackers can send users InfoPath email forms in an attempt to gain access to confidential information. Depending on the level of trust of the forms, it might also be possible to gain access to oth...
    Rule Medium Severity
  • DTOO296 - Managed code from the Internet

    Group
  • Disabling opening forms with managed code from the Internet security zone must be configured.

    When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules