III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
DTOO245 - Lvl 2 File Extensions
<GroupDescription></GroupDescription>Group -
Level 2 file extensions must be blocked and not removed.
<VulnDiscussion>Malicious code is often spread through email. Some viruses have the ability to send copies of themselves to other people in t...Rule Medium Severity -
DTOO218 - Calendar details published by users
<GroupDescription></GroupDescription>Group -
Level of calendar details that a user can publish must be restricted.
<VulnDiscussion>Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Shar...Rule Medium Severity -
DTOO220 - Upload methods
<GroupDescription></GroupDescription>Group -
Upload method for publishing calendars to Office Online must be restricted.
<VulnDiscussion>When users publish their calendar to Microsoft Office Online using the Microsoft Office Outlook Calendar Sharing Service, Out...Rule Medium Severity -
DTOO267 - Retrieving CRLs - Outlook
<GroupDescription></GroupDescription>Group -
Retrieving of CRL data must be set for online action.
<VulnDiscussion>This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Cert...Rule Medium Severity -
DTOO262 - FIPS compliant mode
<GroupDescription></GroupDescription>Group -
Run in FIPS compliant mode must be enforced.
<VulnDiscussion>Outlook can run in a mode that complies with Federal Information Processing Standards (FIPS), a set of standards published by...Rule Medium Severity -
DTOO257 - No S/Mime interop w/ external clients
<GroupDescription></GroupDescription>Group -
S/Mime interoperability with external clients for message handling must be configured.
<VulnDiscussion>In some situations, administrators might wish to use an external program, such as an add-in, to handle S/MIME message decrypt...Rule Medium Severity -
DTOO266 - S/Mime receipt requests
<GroupDescription></GroupDescription>Group -
Automatic sending s/Mime receipt requests must be disallowed.
<VulnDiscussion>Incoming signed or encrypted messages might include S/MIME receipt requests. S/MIME receipts provide confirmation that messag...Rule Medium Severity -
DTOO276 - Security settings for macros
<GroupDescription></GroupDescription>Group -
Always warn on untrusted macros must be enforced.
<VulnDiscussion>To protect users from dangerous code, the Outlook default configuration disables all macros that are not trusted, including u...Rule Medium Severity -
DTOO264 - Clear signed messages
<GroupDescription></GroupDescription>Group -
Send all signed messages as clear signed messages must be configured.
<VulnDiscussion>When users sign email messages with their signing certificate and send them, Outlook uses the sender's private key to encrypt...Rule Medium Severity -
DTOO247 - Custom OOM Action Exe. Prompt
<GroupDescription></GroupDescription>Group -
Custom Outlook Object Model (OOM) action execution prompts must be configured.
<VulnDiscussion>Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom ac...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.