Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • DTOO260 - SMime message formats

    <GroupDescription></GroupDescription>
    Group
  • Message formats must be set to use SMime.

    &lt;VulnDiscussion&gt;Email typically travels over open networks and is passed from server to server. Messages are therefore vulnerable to intercep...
    Rule Medium Severity
  • DTOO268 - Missing Root Certificates

    <GroupDescription></GroupDescription>
    Group
  • Missing Root Certificates warning must be enforced.

    &lt;VulnDiscussion&gt;When Outlook accesses a certificate, it validates that it can trust the certificate by examining the root certificate of the ...
    Rule Medium Severity
  • DTOO239 - Outlook Security Mode

    <GroupDescription></GroupDescription>
    Group
  • Outlook Security Mode must be configured to use Group Policy settings.

    &lt;VulnDiscussion&gt;If users can configure security themselves, they might choose levels of security that leave their computers vulnerable to att...
    Rule Medium Severity
  • DTOO228 - Plain Text Options

    <GroupDescription></GroupDescription>
    Group
  • Plain Text Options for outbound email must be configured.

    &lt;VulnDiscussion&gt;If outgoing mail is formatted in certain ways, for example, if attachments are encoded in UUENCODE format, attackers might ma...
    Rule Medium Severity
  • DTOO217 - Prevent publishing to DAV Servers

    <GroupDescription></GroupDescription>
    Group
  • Publishing to a Web Distributed and Authoring (DAV) server must be prevented.

    &lt;VulnDiscussion&gt;Outlook users can share their calendars with others by publishing them to a server that supports the World Wide Web Distribut...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules