Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • DTOO236 - Add-In Trust Level

    Group
  • The Add-In Trust Level must be configured.

    Under normal circumstances the installed COM add-ins are applications that have been approved and intentionally deployed by the organization and therefore they should not pose a security threat. H...
    Rule Medium Severity
  • DTOO250 - Object Model Prompt for Address Book

    Group
  • Object Model Prompt behavior for programmatic address books must be configured.

    If an untrusted application accesses the address book, the application could gain access to sensitive data and potentially change that data. By default, when an untrusted application attempts to ac...
    Rule Medium Severity
  • DTOO241 - Demote Attachments to Level 2

    Group
  • Action to demote an EMail Level 1 attachment to Level 2 must be configured.

    Outlook uses two levels of security to restrict access to files attached to email messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) ...
    Rule Medium Severity
  • DTOO254 - Object Model Prompt for Formula Property

    Group
  • Object Model Prompt behavior for accessing User Property Formula must be configured.

    A custom form in Outlook could be used to gain access to sensitive address book data and potentially to change that data. By default, when a user tries to bind an address information field to a com...
    Rule Medium Severity
  • DTOO253 - Object Model Prompt for Save As

    Group
  • Object Model Prompt behavior for the SaveAs method must be configured.

    If an untrusted application uses the Save As command to programmatically save an item, the application could add malicious data to a user's inbox, a public folder, or an address book. By default, w...
    Rule Medium Severity
  • DTOO251 - Object Model Prompt for Reading Address

    Group
  • Object Model Prompt behavior for programmatic access of user address data must be configured.

    If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentially change that data. This could result in mail being sent to the wrong pa...
    Rule Medium Severity
  • DTOO252-Object Model Prompt for Meeting Response

    Group
  • Object Model Prompt behavior for Meeting and Task Responses must be configured.

    If an untrusted application programmatically responds to tasks or meeting requests, that application could impersonate a user response to the tasks or meeting requests with false information. By d...
    Rule Medium Severity
  • DTOO249 - Object Model Prmpt for auto email send

    Group
  • Object Model Prompt for programmatic email send behavior must be configured.

    If an untrusted application programmatically sends email, that application could send mail that includes malicious code, impersonate a user, or launch a denial of service attack by sending a large ...
    Rule Medium Severity
  • DTOO256 - Trusted Add-Ins Security

    Group
  • Trusted add-ins behavior for email must be configured.

    The Outlook object model includes entry points to access Outlook data, save data to specified locations, and send email messages, all of which can be used by malicious application developers. To he...
    Rule Medium Severity
  • DTOO237-Disable "remember password" on eMail Accts

    Group
  • The remember password for internet e-mail accounts must be disabled.

    As a security precaution, password caching for email Internet protocols such as POP3 or IMAP may lead to password discovery and eventually to data loss. An attacker that is able to access the user...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules