II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
DTOO111 - Enable IE Bind to Object
Group -
The Internet Explorer Bind to Object functionality must be enabled.
Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the control is set in the registry, or if the secur...Rule Medium Severity -
DTOO117 - Saved from URL
Group -
The Saved from URL mark must be selected to enforce Internet zone processing.
Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indicating the page was saved from a site on the In...Rule Medium Severity -
DTOO123-Block Navigation to URL from Office
Group -
Navigation to URLs embedded in Office products must be blocked.
To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by Offic...Rule Medium Severity -
DTOO129 - Block Pop-Ups
Group -
Links that invoke instances of Internet Explorer from within an Office product must be blocked.
The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can be controlled separately for instances of Inte...Rule Medium Severity -
DTOO272 - Content download from safe zones
Group -
Permit download of content from safe zones must be configured.
By default, Outlook automatically downloads content from sites that are considered "safe," as defined in the Security tab of the Internet Options dialog box in Internet Explorer. This configuration...Rule Medium Severity -
DTOO219 - Access to Published Calendars
Group -
Access restriction settings for published calendars must be configured.
Users can share their calendars with others by publishing them to the Microsoft Office Online Calendar Sharing Services and to a server that supports the World Wide Web Distributed Authoring and Ve...Rule Medium Severity -
DTOO224 - Email Recipient to Safe Sender List
Group -
Recipients of sent email must be unable to be added to the safe senders list.
Users could send email messages to request that they be taken off a mailing list. If the email recipient is then automatically added to the Safe Senders List, future e mail messages from that addre...Rule Medium Severity -
DTOO234 - Active X One-Off Forms
Group -
ActiveX One-Off forms must be configured.
Third-party ActiveX controls are not allowed to run in one-off forms in Outlook. This behavior can be changed so that Safe Controls (Microsoft Forms 2.0 controls and the Outlook Recipient and Body ...Rule Medium Severity -
DTOO246 - Scripts in One-Off Forms
Group -
Scripts in One-Off Outlook forms must be disallowed.
Malicious code can be included within Outlook forms, and such code could be executed when users open the form. By default, Outlook does not run scripts in forms in which the script and the layout ...Rule Medium Severity -
DTOO273 - Block Trusted Zones
Group -
IE Trusted Zones assumed trusted must be blocked.
Malicious users can send HTML email messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether specific recipients open the mes...Rule Medium Severity -
DTOO236 - Add-In Trust Level
Group -
The Add-In Trust Level must be configured.
Under normal circumstances the installed COM add-ins are applications that have been approved and intentionally deployed by the organization and therefore they should not pose a security threat. H...Rule Medium Severity -
DTOO250 - Object Model Prompt for Address Book
Group -
Object Model Prompt behavior for programmatic address books must be configured.
If an untrusted application accesses the address book, the application could gain access to sensitive data and potentially change that data. By default, when an untrusted application attempts to ac...Rule Medium Severity -
DTOO241 - Demote Attachments to Level 2
Group -
Action to demote an EMail Level 1 attachment to Level 2 must be configured.
Outlook uses two levels of security to restrict access to files attached to email messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) ...Rule Medium Severity -
DTOO254 - Object Model Prompt for Formula Property
Group -
Object Model Prompt behavior for accessing User Property Formula must be configured.
A custom form in Outlook could be used to gain access to sensitive address book data and potentially to change that data. By default, when a user tries to bind an address information field to a com...Rule Medium Severity -
DTOO253 - Object Model Prompt for Save As
Group -
Object Model Prompt behavior for the SaveAs method must be configured.
If an untrusted application uses the Save As command to programmatically save an item, the application could add malicious data to a user's inbox, a public folder, or an address book. By default, w...Rule Medium Severity -
DTOO251 - Object Model Prompt for Reading Address
Group -
Object Model Prompt behavior for programmatic access of user address data must be configured.
If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentially change that data. This could result in mail being sent to the wrong pa...Rule Medium Severity -
DTOO252-Object Model Prompt for Meeting Response
Group -
Object Model Prompt behavior for Meeting and Task Responses must be configured.
If an untrusted application programmatically responds to tasks or meeting requests, that application could impersonate a user response to the tasks or meeting requests with false information. By d...Rule Medium Severity -
DTOO249 - Object Model Prmpt for auto email send
Group -
Object Model Prompt for programmatic email send behavior must be configured.
If an untrusted application programmatically sends email, that application could send mail that includes malicious code, impersonate a user, or launch a denial of service attack by sending a large ...Rule Medium Severity -
DTOO256 - Trusted Add-Ins Security
Group -
Trusted add-ins behavior for email must be configured.
The Outlook object model includes entry points to access Outlook data, save data to specified locations, and send email messages, all of which can be used by malicious application developers. To he...Rule Medium Severity -
DTOO237-Disable "remember password" on eMail Accts
Group -
The remember password for internet e-mail accounts must be disabled.
As a security precaution, password caching for email Internet protocols such as POP3 or IMAP may lead to password discovery and eventually to data loss. An attacker that is able to access the user...Rule Medium Severity -
DTOO243 - Level 1 Attachment prompt
Group -
The prompt to display level 1 attachments must be disallowed when closing an item.
To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, to restrict access to files attached to email messages or other items. Po...Rule Medium Severity -
DTOO242 - Level 1 Attachment Prompt on sending.
Group -
The prompt to display level 1 attachments must be disallowed when sending an item.
To protect users from viruses and other harmful files, Outlook 2013 uses two levels of security, designated Level 1 and Level 2, to restrict access to files attached to e-mail messages or other ite...Rule Medium Severity -
DTOO283 - Dwnld articles as HTML attachments
Group -
Disabling download full text of articles as HTML must be configured.
Many RSS feeds use messages that contain a brief summary of a larger message or an article with a link to the full content. Users can configure Outlook to automatically download the linked content ...Rule Medium Severity -
DTOO277 - Links in Email Messages
Group -
Hyperlinks in suspected phishing email messages must be disallowed.
Outlook's Junk E-mail Filter evaluates each incoming message for possible spam or phishing content. Suspicious message detection is always turned on. By default, Outlook handles suspicious message...Rule Medium Severity -
DTOO279 - Enable RPC Encryption
Group -
RPC encryption between Outlook and Exchange server must be enforced.
The remote procedure call (RPC) communication channel between an Outlook client computer and an Exchange server is not encrypted. If a malicious individual is able to eavesdrop on the network traff...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.