Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt for programmatic email send behavior must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outloo...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for programmatic address books must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to gain access to an Address Book using the Outl...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for programmatic access of user address data must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for Meeting and Task Responses must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for the SaveAs method must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically s...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • Object Model Prompt behavior for accessing User Property Formula must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls what happens when a user designs a custom form in Outlook and attempts to bind an Address Inform...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Trusted add-ins behavior for email must be configured.

    &lt;VulnDiscussion&gt;This policy setting can be used to specify a list of trusted add-ins that can be run without being restricted by the security...
    Rule Medium Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • S/Mime interoperability with external clients for message handling must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook decodes encrypted messages itself or passes them to an external program for proc...
    Rule Medium Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • Message formats must be set to use SMime.

    &lt;VulnDiscussion&gt;This policy setting controls which message encryption formats Outlook can use. Outlook supports three formats for encrypting ...
    Rule Medium Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • Run in FIPS compliant mode must be enforced.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook is required to use FIPS-compliant algorithms when signing and encrypting message...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Send all signed messages as clear signed messages must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook sends signed messages as clear text signed messages. If you enable this policy s...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Automatic sending s/Mime receipt requests must be disallowed.

    &lt;VulnDiscussion&gt;This policy setting controls how Outlook handles S/MIME receipt requests. If you enable this policy setting, you can choose f...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • Retrieving of CRL data must be set for online action.

    &lt;VulnDiscussion&gt;This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates.Certif...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • External content and pictures in HTML email must be displayed.

    &lt;VulnDiscussion&gt;This policy setting setting controls whether Outlook downloads untrusted pictures and external content located in HTML e-mail...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Automatic download content for email in Safe Senders list must be disallowed.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook automatically downloads external content in e-mail from senders in the Safe Send...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Permit download of content from safe zones must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook automatically downloads content from safe zones when displaying messages. If you...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • IE Trusted Zones assumed trusted must be blocked.

    &lt;VulnDiscussion&gt;This policy setting controls whether pictures from sites in the Trusted Sites security zone are automatically downloaded in O...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Internet with Safe Zones for Picture Download must be disabled.

    &lt;VulnDiscussion&gt;This policy setting controls whether pictures and external content in HTML e-mail messages from untrusted senders on the Inte...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Intranet with Safe Zones for automatic picture downloads must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls whether pictures and external content in HTML e-mail messages from untrusted senders on the loca...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Always warn on untrusted macros must be enforced.

    &lt;VulnDiscussion&gt;This policy setting controls the security level for macros in Outlook. If you enable this policy setting, you can choose from...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Hyperlinks in suspected phishing email messages must be disallowed.

    &lt;VulnDiscussion&gt;This policy setting controls whether hyperlinks in suspected phishing e-mail messages in Outlook are allowed. If you enable t...
    Rule Medium Severity
  • SRG-APP-000395

    <GroupDescription></GroupDescription>
    Group
  • RPC encryption between Outlook and Exchange server must be enforced.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook uses remote procedure call (RPC) encryption to communicate with Microsoft Exchan...
    Rule Medium Severity
  • SRG-APP-000395

    <GroupDescription></GroupDescription>
    Group
  • Outlook must be configured to force authentication when connecting to an Exchange server.

    &lt;VulnDiscussion&gt;This policy setting controls which authentication method Outlook uses to authenticate with Microsoft Exchange Server. Note - ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Disabling download full text of articles as HTML must be configured.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook automatically makes an offline copy of the RSS items as HTML attachments. If you...
    Rule Medium Severity
  • SRG-APP-000209

    <GroupDescription></GroupDescription>
    Group
  • Automatic download of Internet Calendar appointment attachments must be disallowed.

    &lt;VulnDiscussion&gt;This policy setting controls whether Outlook downloads files attached to Internet Calendar appointments. If you enable this p...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules