Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • DTOO245 - Lvl 2 File Extensions

    <GroupDescription></GroupDescription>
    Group
  • Level 2 file extensions must be blocked and not removed.

    &lt;VulnDiscussion&gt;Malicious code is often spread through email. Some viruses have the ability to send copies of themselves to other people in t...
    Rule Medium Severity
  • DTOO218 - Calendar details published by users

    <GroupDescription></GroupDescription>
    Group
  • Level of calendar details that a user can publish must be restricted.

    &lt;VulnDiscussion&gt;Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Shar...
    Rule Medium Severity
  • DTOO220 - Upload methods

    <GroupDescription></GroupDescription>
    Group
  • Upload method for publishing calendars to Office Online must be restricted.

    &lt;VulnDiscussion&gt;When users publish their calendar to Microsoft Office Online using the Microsoft Office Outlook Calendar Sharing Service, Out...
    Rule Medium Severity
  • DTOO267 - Retrieving CRLs - Outlook

    <GroupDescription></GroupDescription>
    Group
  • Retrieving of CRL data must be set for online action.

    &lt;VulnDiscussion&gt;This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Cert...
    Rule Medium Severity
  • DTOO262 - FIPS compliant mode

    <GroupDescription></GroupDescription>
    Group
  • Run in FIPS compliant mode must be enforced.

    &lt;VulnDiscussion&gt;Outlook can run in a mode that complies with Federal Information Processing Standards (FIPS), a set of standards published by...
    Rule Medium Severity
  • DTOO257 - No S/Mime interop w/ external clients

    <GroupDescription></GroupDescription>
    Group
  • S/Mime interoperability with external clients for message handling must be configured.

    &lt;VulnDiscussion&gt;In some situations, administrators might wish to use an external program, such as an add-in, to handle S/MIME message decrypt...
    Rule Medium Severity
  • DTOO266 - S/Mime receipt requests

    <GroupDescription></GroupDescription>
    Group
  • Automatic sending s/Mime receipt requests must be disallowed.

    &lt;VulnDiscussion&gt;Incoming signed or encrypted messages might include S/MIME receipt requests. S/MIME receipts provide confirmation that messag...
    Rule Medium Severity
  • DTOO276 - Security settings for macros

    <GroupDescription></GroupDescription>
    Group
  • Always warn on untrusted macros must be enforced.

    &lt;VulnDiscussion&gt;To protect users from dangerous code, the Outlook default configuration disables all macros that are not trusted, including u...
    Rule Medium Severity
  • DTOO264 - Clear signed messages

    <GroupDescription></GroupDescription>
    Group
  • Send all signed messages as clear signed messages must be configured.

    &lt;VulnDiscussion&gt;When users sign email messages with their signing certificate and send them, Outlook uses the sender's private key to encrypt...
    Rule Medium Severity
  • DTOO247 - Custom OOM Action Exe. Prompt

    <GroupDescription></GroupDescription>
    Group
  • Custom Outlook Object Model (OOM) action execution prompts must be configured.

    &lt;VulnDiscussion&gt;Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom ac...
    Rule Medium Severity
  • DTOO265 - Signature Warnings

    <GroupDescription></GroupDescription>
    Group
  • Warning about invalid signatures must be enforced.

    &lt;VulnDiscussion&gt;If users open email messages that include invalid digital signatures, Outlook displays a warning dialog box. Users can decide...
    Rule Medium Severity
  • DTOO281 - Sync RSS Feeds w/Common List

    <GroupDescription></GroupDescription>
    Group
  • RSS feed synchronization with Common Feed List must be disallowed.

    &lt;VulnDiscussion&gt;The Common Feed list is a hierarchical set of RSS feeds to which clients such as Outlook 2013, the Feeds list in Internet Exp...
    Rule Medium Severity
  • DTOO223 - Trust EMail from Contacts

    <GroupDescription></GroupDescription>
    Group
  • Trust EMail from senders in receivers contact list must be enforced.

    &lt;VulnDiscussion&gt;Email addresses in users' Contacts list are treated as safe senders for purposes of filtering junk email. If this configurati...
    Rule Medium Severity
  • DTOO282 - RSS Feeds

    <GroupDescription></GroupDescription>
    Group
  • RSS Feeds must be disallowed.

    &lt;VulnDiscussion&gt;Users can subscribe to RSS feeds from within Outlook and read RSS items like email messages. If an organization has policies ...
    Rule Medium Severity
  • DTOO231 - Unicode use when dragging Email

    <GroupDescription></GroupDescription>
    Group
  • Dragging Unicode email messages to file system must be disallowed.

    &lt;VulnDiscussion&gt;When users drag email messages from Outlook to a Windows Explorer window or to their Desktop, Outlook creates an .msg file us...
    Rule Medium Severity
  • DTOO286 - Disable User Entries to Server list

    <GroupDescription></GroupDescription>
    Group
  • User Entries to Server List must be disallowed.

    &lt;VulnDiscussion&gt;If users are able to manually enter the addresses of servers that are not approved by the organization, they could use server...
    Rule Medium Severity
  • DTOO126 - Add-on Management

    <GroupDescription></GroupDescription>
    Group
  • Add-on Management functionality must be allowed.

    &lt;VulnDiscussion&gt;Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons ma...
    Rule Medium Severity
  • DTOO209 - Zone Elevation Protection

    <GroupDescription></GroupDescription>
    Group
  • Protection from zone elevation must be enforced.

    &lt;VulnDiscussion&gt;Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local compute...
    Rule Medium Severity
  • DTOO211 - Restrict ActiveX Install

    <GroupDescription></GroupDescription>
    Group
  • ActiveX installs must be configured for proper restrictions.

    &lt;VulnDiscussion&gt;Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within...
    Rule Medium Severity
  • DTOO132 - Restrict File Download

    <GroupDescription></GroupDescription>
    Group
  • File Downloads must be configured for proper restrictions.

    &lt;VulnDiscussion&gt;Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the...
    Rule Medium Severity
  • DTOO124 - Scripted Window Security

    <GroupDescription></GroupDescription>
    Group
  • Scripted Window Security must be enforced.

    &lt;VulnDiscussion&gt;Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site t...
    Rule Medium Severity
  • DTOO313 - Automatically download enclosures

    <GroupDescription></GroupDescription>
    Group
  • Automatically downloading enclosures on RSS must be disallowed.

    &lt;VulnDiscussion&gt;This policy setting controls Outlook's ability to automatically download enclosures on RSS items.&lt;/VulnDiscussion&gt;&lt;F...
    Rule Medium Severity
  • DTOO344 - Outlook Rich Text options

    <GroupDescription></GroupDescription>
    Group
  • Outlook Rich Text options must be set for converting to plain text format.

    &lt;VulnDiscussion&gt;Outlook automatically converts RTF formatted messages that are sent over the Internet to HTML format, so that the message for...
    Rule Medium Severity
  • DTOO314 - Set message format

    <GroupDescription></GroupDescription>
    Group
  • Default message format must be set to use Plain Text.

    &lt;VulnDiscussion&gt;Outlook uses HTML as the default email format. HTML format poses a security risk by embedding information into the email itse...
    Rule Medium Severity
  • DTOO315 - Outlook Security settings

    <GroupDescription></GroupDescription>
    Group
  • Outlook must be configured not to prompt users to choose security settings if default settings fail.

    &lt;VulnDiscussion&gt;This policy prompts the user to choose security settings if default settings fail, but allowing users to select their own sec...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules