Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • DTOO238 - Prev't users customizing security set

    <GroupDescription></GroupDescription>
    Group
  • Users customizing attachment security settings must be prevented.

    &lt;VulnDiscussion&gt;All installed trusted COM addins can be trusted. Exchange Settings for the addins still override if present and this option ...
    Rule Medium Severity
  • DTOO214 - Read EMail as plain text

    <GroupDescription></GroupDescription>
    Group
  • Read EMail as plain text must be enforced.

    &lt;VulnDiscussion&gt;Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By defaul...
    Rule Medium Severity
  • DTOO215 - Read signed EMail as plain text

    <GroupDescription></GroupDescription>
    Group
  • Read signed email as plain text must be enforced.

    &lt;VulnDiscussion&gt;Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By defaul...
    Rule Medium Severity
  • DTOO244 - Lvl 1 File extensions

    <GroupDescription></GroupDescription>
    Group
  • Level 1 file extensions must be blocked and not removed.

    &lt;VulnDiscussion&gt;Malicious code is often spread through e-mail. Some viruses have the ability to send copies of themselves to other people in ...
    Rule Medium Severity
  • DTOO245 - Lvl 2 File Extensions

    <GroupDescription></GroupDescription>
    Group
  • Level 2 file extensions must be blocked and not removed.

    &lt;VulnDiscussion&gt;Malicious code is often spread through e-mail. Some viruses have the ability to send copies of themselves to other people in ...
    Rule Medium Severity
  • DTOO218 - Calendar details published by users

    <GroupDescription></GroupDescription>
    Group
  • Level of calendar details that a user can publish must be restricted.

    &lt;VulnDiscussion&gt;Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Shar...
    Rule Medium Severity
  • DTOO220 - Upload methods

    <GroupDescription></GroupDescription>
    Group
  • Upload method for publishing calendars to Office Online must be restricted.

    &lt;VulnDiscussion&gt;When users publish their calendar to Microsoft Office Online using the Microsoft Office Outlook Calendar Sharing Service, Out...
    Rule Medium Severity
  • DTOO267 - Retrieving CRLs - Outlook

    <GroupDescription></GroupDescription>
    Group
  • Retrieving of CRL data must be set for online action.

    &lt;VulnDiscussion&gt;This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Cert...
    Rule Medium Severity
  • DTOO262 - FIPS compliant mode

    <GroupDescription></GroupDescription>
    Group
  • Run in FIPS compliant mode must be enforced.

    &lt;VulnDiscussion&gt;Outlook can run in a mode that complies with Federal Information Processing Standards (FIPS), a set of standards published by...
    Rule Medium Severity
  • DTOO257 - No S/Mime interop w/ external clients

    <GroupDescription></GroupDescription>
    Group
  • S/Mime interoperability with external clients for message handling must be configured.

    &lt;VulnDiscussion&gt;In some situations, administrators might wish to use an external program, such as an add-in, to handle S/MIME message decrypt...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules