I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
DTOO251 - Object Model Prompt for Reading Address
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for programmatic access of user address data must be configured.
<VulnDiscussion>If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentiall...Rule Medium Severity -
DTOO252-Object Model Prompt for Meeting Response
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for Meeting and Task Responses must be configured.
<VulnDiscussion>If an untrusted application programmatically responds to tasks or meeting requests, that application could impersonate a user...Rule Medium Severity -
DTOO249 - Object Model Prmpt for auto email send
<GroupDescription></GroupDescription>Group -
Object Model Prompt for programmatic email send behavior must be configured.
<VulnDiscussion>If an untrusted application programmatically sends email, that application could send mail that includes malicious code, impe...Rule Medium Severity -
DTOO256 - Trusted Add-Ins Security
<GroupDescription></GroupDescription>Group -
Trusted add-ins behavior for email must be configured.
<VulnDiscussion>The Outlook object model includes entry points to access Outlook data, save data to specified locations, and send email messa...Rule Medium Severity -
DTOO237-Disable "remember password" on eMail Accts
<GroupDescription></GroupDescription>Group -
The remember password for internet e-mail accounts must be disabled.
<VulnDiscussion>As a security precaution, password caching for email Internet protocols such as POP3 or IMAP may lead to password discovery a...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.