Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • DTOO104 - Disable user name and password

    <GroupDescription></GroupDescription>
    Group
  • Disable user name and password syntax from being used in URLs

    &lt;VulnDiscussion&gt;The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://usern...
    Rule Medium Severity
  • DTOO111 - Enable IE Bind to Object

    <GroupDescription></GroupDescription>
    Group
  • Enabling IE Bind to Object functionality must be present.

    &lt;VulnDiscussion&gt;Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control...
    Rule Medium Severity
  • DTOO117 - Saved from URL

    <GroupDescription></GroupDescription>
    Group
  • Saved from URL mark to assure Internet zone processing must be enforced.

    &lt;VulnDiscussion&gt;Typically, when Internet Explorer loads a Web page from a Universal Naming Convention (UNC) share that contains a Mark of the...
    Rule Medium Severity
  • DTOO123-Block Navigation to URL from Office

    <GroupDescription></GroupDescription>
    Group
  • Navigation to URL's embedded in Office products must be blocked.

    &lt;VulnDiscussion&gt;To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be c...
    Rule Medium Severity
  • DTOO129 - Block Pop-Ups

    <GroupDescription></GroupDescription>
    Group
  • Links that invoke instances of IE from within an Office product must be blocked.

    &lt;VulnDiscussion&gt;The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearin...
    Rule Medium Severity
  • DTOO272 - Content download from safe zones

    <GroupDescription></GroupDescription>
    Group
  • Permit download of content from safe zones must be configured.

    &lt;VulnDiscussion&gt;By default, Outlook automatically downloads content from sites that are considered "safe," as defined in the Security tab of ...
    Rule Medium Severity
  • DTOO219 - Access to Published Calendars

    <GroupDescription></GroupDescription>
    Group
  • Access restriction settings for published calendars must be configured.

    &lt;VulnDiscussion&gt;Users can share their calendars with others by publishing them to the Microsoft Office Online Calendar Sharing Services and t...
    Rule Medium Severity
  • DTOO224 - Email Recipient to Safe Sender List

    <GroupDescription></GroupDescription>
    Group
  • Recipients of sent email must be unable to be added to the safe sender's list.

    &lt;VulnDiscussion&gt;Users could send e-mail messages to request that they be taken off a mailing list. If the e-mail recipient is then automatica...
    Rule Medium Severity
  • DTOO234 - Active X One-Off Forms

    <GroupDescription></GroupDescription>
    Group
  • Active X One-Off forms must be configured.

    &lt;VulnDiscussion&gt;Third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Co...
    Rule Medium Severity
  • DTOO246 - Scripts in One-Off Forms

    <GroupDescription></GroupDescription>
    Group
  • Scripts in One-Off Outlook forms must be disallowed.

    &lt;VulnDiscussion&gt;Malicious code can be included within Outlook forms, and such code could be executed when users open the form. By default, O...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules