Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Add-on Management functionality must be allowed in PowerPoint Viewer.

    &lt;VulnDiscussion&gt;Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons ma...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Links that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint Viewer.

    &lt;VulnDiscussion&gt;The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearin...
    Rule Medium Severity
  • SRG-APP-000112

    <GroupDescription></GroupDescription>
    Group
  • Protection from zone elevation must be enforced in PowerPoint Viewer.

    &lt;VulnDiscussion&gt;Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local compute...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • ActiveX Installs must be configured for proper restriction in PowerPoint Viewer.

    &lt;VulnDiscussion&gt;Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Macros must be blocked from running in Office files from the Internet.

    &lt;VulnDiscussion&gt;This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this ...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Navigation to URLs embedded in Office products must be blocked in PowerPoint.

    &lt;VulnDiscussion&gt;To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be c...
    Rule Medium Severity
  • SRG-APP-000112

    <GroupDescription></GroupDescription>
    Group
  • Scripted Window Security must be enforced in PowerPoint.

    &lt;VulnDiscussion&gt;Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site t...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Files in unsafe locations must be opened in Protected View.

    &lt;VulnDiscussion&gt;This policy setting determines whether files located in unsafe locations will open in Protected View. If unsafe locations hav...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Document behavior if file validation fails must be set.

    &lt;VulnDiscussion&gt;This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting, ...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Files on local Intranet UNC must be opened in Protected View.

    &lt;VulnDiscussion&gt;This policy setting lets you determine if files on local Intranet UNC file shares open in Protected View. If you enable this ...
    Rule Medium Severity
  • SRG-APP-000209

    <GroupDescription></GroupDescription>
    Group
  • File Downloads must be configured for proper restrictions in PowerPoint Viewer.

    &lt;VulnDiscussion&gt;Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules