Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • DTOO278 - Auto configure profile based on AD

    <GroupDescription></GroupDescription>
    Group
  • Automatically configure user profile based on Active Directory primary SMTP address must be enforced.

    &lt;VulnDiscussion&gt;If a user is joined to a domain in an Active Directory environment and does not have an e-mail account configured, Outlook po...
    Rule Medium Severity
  • DTOO284 - Auto download attachments Internet Cal

    <GroupDescription></GroupDescription>
    Group
  • Automatic download of Internet Calendar appointment attachments must be disallowed.

    &lt;VulnDiscussion&gt;Files attached to Internet Calendar appointments could contain malicious code that could be used to compromise a computer. By...
    Rule Medium Severity
  • DTOO271 - Auto Download from Safe lists

    <GroupDescription></GroupDescription>
    Group
  • Automatic download content for email in Safe Senders list must be disallowed.

    &lt;VulnDiscussion&gt;Malicious e-mail senders can send HTML e-mail messages with embedded Web beacons, or pictures and other content from external...
    Rule Medium Severity
  • DTOO229 - Make Outlook the default program

    <GroupDescription></GroupDescription>
    Group
  • Outlook must be enforced as the default email, calendar, and contacts program.

    &lt;VulnDiscussion&gt;Outlook is made the default program for E-mail, contacts, and calendar services when it is installed, although users can desi...
    Rule Medium Severity
  • DTOO260 - SMime message formats

    <GroupDescription></GroupDescription>
    Group
  • Message formats must be set to use SMime.

    &lt;VulnDiscussion&gt;E-mail typically travels over open networks and is passed from server to server. Messages are therefore vulnerable to interce...
    Rule Medium Severity
  • DTOO268 - Missing Root Certificates

    <GroupDescription></GroupDescription>
    Group
  • Missing Root Certificates warning must be enforced.

    &lt;VulnDiscussion&gt;When Outlook accesses a certificate, it validates that it can trust the certificate by examining the root certificate of the ...
    Rule Medium Severity
  • DTOO239 - Outlook Security Mode

    <GroupDescription></GroupDescription>
    Group
  • Outlook Security Mode must be configured to use Group Policy settings.

    &lt;VulnDiscussion&gt;If users can configure security themselves, they might choose levels of security that leave their computers vulnerable to att...
    Rule Medium Severity
  • DTOO228 - Plain Text Options

    <GroupDescription></GroupDescription>
    Group
  • Plain Text Options for outbound email must be configured.

    &lt;VulnDiscussion&gt;If outgoing mail is formatted in certain ways, for example if attachments are encoded in UUENCODE format, attackers might man...
    Rule Medium Severity
  • DTOO217 - Prevent publishing to DAV Servers

    <GroupDescription></GroupDescription>
    Group
  • Publishing to a Web Distributed and Authoring (DAV) server must be prevented.

    &lt;VulnDiscussion&gt;Outlook users can share their calendars with others by publishing them to a server that supports the World Wide Web Distribut...
    Rule Medium Severity
  • DTOO216 - Publishing to Office Online

    <GroupDescription></GroupDescription>
    Group
  • Publishing calendars to Office Online must be prevented.

    &lt;VulnDiscussion&gt;Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Shar...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules