II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
DTOO245 - Lvl 2 File Extensions
Group -
Level 2 file extensions must be blocked and not removed.
Malicious code is often spread through email. Some viruses have the ability to send copies of themselves to other people in the victim's Address Book or Contacts list, and such potentially harmful ...Rule Medium Severity -
DTOO218 - Calendar details published by users
Group -
Level of calendar details that a user can publish must be restricted.
Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Sharing Service. Users can choose from three levels of detail: * Availabilit...Rule Medium Severity -
DTOO220 - Upload methods
Group -
Upload method for publishing calendars to Office Online must be restricted.
When users publish their calendar to Microsoft Office Online using the Microsoft Office Outlook Calendar Sharing Service, Outlook updates the calendars online at regular intervals unless they click...Rule Medium Severity -
DTOO267 - Retrieving CRLs - Outlook
Group -
Retrieving of CRL data must be set for online action.
This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Certificate revocation lists (CRLs) are lists of digital certificates that h...Rule Medium Severity -
DTOO262 - FIPS compliant mode
Group -
Run in FIPS compliant mode must be enforced.
Outlook can run in a mode that complies with Federal Information Processing Standards (FIPS), a set of standards published by the National Institute of Standards and Technology (NIST) for use by no...Rule Medium Severity -
DTOO257 - No S/Mime interop w/ external clients
Group -
S/Mime interoperability with external clients for message handling must be configured.
In some situations, administrators might wish to use an external program, such as an add-in, to handle S/MIME message decryption. If your organization works with encrypted messages that the decrypt...Rule Medium Severity -
DTOO266 - S/Mime receipt requests
Group -
Automatic sending s/Mime receipt requests must be disallowed.
Incoming signed or encrypted messages might include S/MIME receipt requests. S/MIME receipts provide confirmation that messages are received unaltered, and can include information about who opened ...Rule Medium Severity -
DTOO276 - Security settings for macros
Group -
Always warn on untrusted macros must be enforced.
To protect users from dangerous code, the Outlook default configuration disables all macros that are not trusted, including unsigned macros, macros with expired or invalid signatures, and macros wi...Rule Medium Severity -
DTOO264 - Clear signed messages
Group -
Send all signed messages as clear signed messages must be configured.
When users sign email messages with their signing certificate and send them, Outlook uses the sender's private key to encrypt the digital signature but sends the messages as clear text, unless they...Rule Medium Severity -
DTOO247 - Custom OOM Action Exe. Prompt
Group -
Custom Outlook Object Model (OOM) action execution prompts must be configured.
Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom actions can be created that reply to messages in ways that circumvent the ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.