Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • DTOO111 - Enable IE Bind to Object

    Group
  • The Internet Explorer Bind to Object functionality must be enabled.

    Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the control is set in the registry, or if the secur...
    Rule Medium Severity
  • DTOO117 - Saved from URL

    Group
  • The Saved from URL mark must be selected to enforce Internet zone processing.

    Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indicating the page was saved from a site on the In...
    Rule Medium Severity
  • DTOO123-Block Navigation to URL from Office

    Group
  • Navigation to URLs embedded in Office products must be blocked.

    To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by Offic...
    Rule Medium Severity
  • DTOO129 - Block Pop-Ups

    Group
  • Links that invoke instances of Internet Explorer from within an Office product must be blocked.

    The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can be controlled separately for instances of Inte...
    Rule Medium Severity
  • DTOO272 - Content download from safe zones

    Group
  • Permit download of content from safe zones must be configured.

    By default, Outlook automatically downloads content from sites that are considered "safe," as defined in the Security tab of the Internet Options dialog box in Internet Explorer. This configuration...
    Rule Medium Severity
  • DTOO219 - Access to Published Calendars

    Group
  • Access restriction settings for published calendars must be configured.

    Users can share their calendars with others by publishing them to the Microsoft Office Online Calendar Sharing Services and to a server that supports the World Wide Web Distributed Authoring and Ve...
    Rule Medium Severity
  • DTOO224 - Email Recipient to Safe Sender List

    Group
  • Recipients of sent email must be unable to be added to the safe senders list.

    Users could send email messages to request that they be taken off a mailing list. If the email recipient is then automatically added to the Safe Senders List, future e mail messages from that addre...
    Rule Medium Severity
  • DTOO234 - Active X One-Off Forms

    Group
  • ActiveX One-Off forms must be configured.

    Third-party ActiveX controls are not allowed to run in one-off forms in Outlook. This behavior can be changed so that Safe Controls (Microsoft Forms 2.0 controls and the Outlook Recipient and Body ...
    Rule Medium Severity
  • DTOO246 - Scripts in One-Off Forms

    Group
  • Scripts in One-Off Outlook forms must be disallowed.

    Malicious code can be included within Outlook forms, and such code could be executed when users open the form. By default, Outlook does not run scripts in forms in which the script and the layout ...
    Rule Medium Severity
  • DTOO273 - Block Trusted Zones

    Group
  • IE Trusted Zones assumed trusted must be blocked.

    Malicious users can send HTML email messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether specific recipients open the mes...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules