III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
DTOO238 - Prev't users customizing security set
<GroupDescription></GroupDescription>Group -
Users customizing attachment security settings must be prevented.
<VulnDiscussion>All installed trusted COM addins can be trusted. Exchange Settings for the addins still override if present and this option ...Rule Medium Severity -
DTOO214 - Read EMail as plain text
<GroupDescription></GroupDescription>Group -
Read EMail as plain text must be enforced.
<VulnDiscussion>Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By defaul...Rule Medium Severity -
DTOO215 - Read signed EMail as plain text
<GroupDescription></GroupDescription>Group -
Read signed email as plain text must be enforced.
<VulnDiscussion>Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By defaul...Rule Medium Severity -
DTOO244 - Lvl 1 File extensions
<GroupDescription></GroupDescription>Group -
Level 1 file extensions must be blocked and not removed.
<VulnDiscussion>Malicious code is often spread through e-mail. Some viruses have the ability to send copies of themselves to other people in ...Rule Medium Severity -
DTOO245 - Lvl 2 File Extensions
<GroupDescription></GroupDescription>Group -
Level 2 file extensions must be blocked and not removed.
<VulnDiscussion>Malicious code is often spread through e-mail. Some viruses have the ability to send copies of themselves to other people in ...Rule Medium Severity -
DTOO218 - Calendar details published by users
<GroupDescription></GroupDescription>Group -
Level of calendar details that a user can publish must be restricted.
<VulnDiscussion>Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Shar...Rule Medium Severity -
DTOO220 - Upload methods
<GroupDescription></GroupDescription>Group -
Upload method for publishing calendars to Office Online must be restricted.
<VulnDiscussion>When users publish their calendar to Microsoft Office Online using the Microsoft Office Outlook Calendar Sharing Service, Out...Rule Medium Severity -
DTOO267 - Retrieving CRLs - Outlook
<GroupDescription></GroupDescription>Group -
Retrieving of CRL data must be set for online action.
<VulnDiscussion>This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Cert...Rule Medium Severity -
DTOO262 - FIPS compliant mode
<GroupDescription></GroupDescription>Group -
Run in FIPS compliant mode must be enforced.
<VulnDiscussion>Outlook can run in a mode that complies with Federal Information Processing Standards (FIPS), a set of standards published by...Rule Medium Severity -
DTOO257 - No S/Mime interop w/ external clients
<GroupDescription></GroupDescription>Group -
S/Mime interoperability with external clients for message handling must be configured.
<VulnDiscussion>In some situations, administrators might wish to use an external program, such as an add-in, to handle S/MIME message decrypt...Rule Medium Severity -
DTOO266 - S/Mime receipt requests
<GroupDescription></GroupDescription>Group -
Automatic sending s/Mime receipt requests must be disallowed.
<VulnDiscussion>Incoming signed or encrypted messages might include S/MIME receipt requests. S/MIME receipts provide confirmation that messag...Rule Medium Severity -
DTOO276 - Security settings for macros
<GroupDescription></GroupDescription>Group -
Always warn on untrusted macros must be enforced.
<VulnDiscussion>To protect users from dangerous code, the Outlook default configuration disables all macros that are not trusted, including u...Rule Medium Severity -
DTOO264 - Clear signed messages
<GroupDescription></GroupDescription>Group -
All signed messages as clear signed messages must be configured.
<VulnDiscussion>When users sign e-mail messages with their digital signature and send them, Outlook uses the signature's private key to encry...Rule Medium Severity -
DTOO247 - Custom OOM Action Exe. Prompt
<GroupDescription></GroupDescription>Group -
Custom Outlook Object Model (OOM) action execution prompts must be configured.
<VulnDiscussion>Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom ac...Rule Medium Severity -
DTOO265 - Signature Warnings
<GroupDescription></GroupDescription>Group -
Warning about invalid signatures must be enforced.
<VulnDiscussion>If users open e-mail messages that include invalid digital signatures, Outlook displays a warning dialog box. Users can decid...Rule Medium Severity -
DTOO281 - Sync RSS Feeds w/Common List
<GroupDescription></GroupDescription>Group -
RSS feed synchronization with Common Feed List must be disallowed.
<VulnDiscussion>The Common Feed list is a hierarchical set of RSS feeds to which clients such as Outlook 2010, the Feeds list in Internet Exp...Rule Medium Severity -
DTOO223 - Trust EMail from Contacts
<GroupDescription></GroupDescription>Group -
Trust EMail from senders in receiver's contact list must be enforced.
<VulnDiscussion>E-mail addresses in users' Contacts list are treated as safe senders for purposes of filtering junk e-mail. If this configura...Rule Medium Severity -
DTOO282 - RSS Feeds
<GroupDescription></GroupDescription>Group -
RSS Feeds must be disallowed.
<VulnDiscussion>Users can subscribe to RSS feeds from within Outlook and read RSS items like e-mail messages. If your organization has polici...Rule Medium Severity -
DTOO231 - Unicode use when dragging Email
<GroupDescription></GroupDescription>Group -
Dragging Unicode eMail messages to file system must be disallowed.
<VulnDiscussion>When users drag e-mail messages from Outlook to a Windows Explorer window or to their Desktop, Outlook creates a .msg file us...Rule Medium Severity -
DTOO286 - Disable User Entries to Server list
<GroupDescription></GroupDescription>Group -
User Entries to Server List must be disallowed.
<VulnDiscussion>If users are able to manually enter the addresses of servers that are not approved by the organization, they could use server...Rule Medium Severity -
DTOO126 - Add-on Management
<GroupDescription></GroupDescription>Group -
Add-on Management functionality must be allowed.
<VulnDiscussion>Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons ma...Rule Medium Severity -
DTOO209 - Zone Elevation Protection
<GroupDescription></GroupDescription>Group -
Protection from zone elevation must be enforced.
<VulnDiscussion>Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local compute...Rule Medium Severity -
DTOO211 - Restrict ActiveX Install
<GroupDescription></GroupDescription>Group -
ActiveX Installs must be configured for proper restriction.
<VulnDiscussion>Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within...Rule Medium Severity -
DTOO132 - Restrict File Download
<GroupDescription></GroupDescription>Group -
File Downloads must be configured for proper restrictions.
<VulnDiscussion>Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the...Rule Medium Severity -
DTOO124 - Scripted Window Security
<GroupDescription></GroupDescription>Group -
Scripted Window Security must be enforced.
<VulnDiscussion>Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.