I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
DTOO260 - SMime message formats
<GroupDescription></GroupDescription>Group -
Message formats must be set to use SMime.
<VulnDiscussion>Email typically travels over open networks and is passed from server to server. Messages are therefore vulnerable to intercep...Rule Medium Severity -
DTOO268 - Missing Root Certificates
<GroupDescription></GroupDescription>Group -
Missing Root Certificates warning must be enforced.
<VulnDiscussion>When Outlook accesses a certificate, it validates that it can trust the certificate by examining the root certificate of the ...Rule Medium Severity -
DTOO239 - Outlook Security Mode
<GroupDescription></GroupDescription>Group -
Outlook Security Mode must be configured to use Group Policy settings.
<VulnDiscussion>If users can configure security themselves, they might choose levels of security that leave their computers vulnerable to att...Rule Medium Severity -
DTOO228 - Plain Text Options
<GroupDescription></GroupDescription>Group -
Plain Text Options for outbound email must be configured.
<VulnDiscussion>If outgoing mail is formatted in certain ways, for example, if attachments are encoded in UUENCODE format, attackers might ma...Rule Medium Severity -
DTOO217 - Prevent publishing to DAV Servers
<GroupDescription></GroupDescription>Group -
Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
<VulnDiscussion>Outlook users can share their calendars with others by publishing them to a server that supports the World Wide Web Distribut...Rule Medium Severity -
DTOO216 - Publishing to Office Online
<GroupDescription></GroupDescription>Group -
Publishing calendars to Office Online must be prevented.
<VulnDiscussion>Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Shar...Rule Medium Severity -
DTOO238 - Prev't users customizing security set
<GroupDescription></GroupDescription>Group -
Users customizing attachment security settings must be prevented.
<VulnDiscussion>All installed trusted COM addins can be trusted. Exchange settings for the addins still override if present and this option ...Rule Medium Severity -
DTOO214 - Read EMail as plain text
<GroupDescription></GroupDescription>Group -
Read EMail as plain text must be enforced.
<VulnDiscussion>Outlook can display email messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By default...Rule Medium Severity -
DTOO215 - Read signed EMail as plain text
<GroupDescription></GroupDescription>Group -
Read signed email as plain text must be enforced.
<VulnDiscussion>Outlook can display email messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By default...Rule Medium Severity -
DTOO244 - Lvl 1 File extensions
<GroupDescription></GroupDescription>Group -
Level 1 file extensions must be blocked and not removed.
<VulnDiscussion>Malicious code is often spread through e-mail. Some viruses have the ability to send copies of themselves to other people in ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.