III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
The ability to display level 1 attachments must be disallowed.
<VulnDiscussion>This policy setting controls whether Outlook blocks potentially dangerous attachments designated Level 1. Outlook uses two le...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
Level 1 file extensions must be blocked and not removed.
<VulnDiscussion>This policy setting controls which types of attachments (determined by file extension) Outlook prevents from being delivered....Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
Level 2 file extensions must be blocked and not removed.
<VulnDiscussion>This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Scripts in One-Off Outlook forms must be disallowed.
<VulnDiscussion>This policy setting controls whether scripts can run in Outlook forms in which the script and layout are contained within the...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
Custom Outlook Object Model (OOM) action execution prompts must be configured.
<VulnDiscussion>This policy setting controls whether Outlook prompts users before executing a custom action. Custom actions add functionality...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
Object Model Prompt for programmatic email send behavior must be configured.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outloo...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for programmatic address books must be configured.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to gain access to an Address Book using the Outl...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for programmatic access of user address data must be configured.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for Meeting and Task Responses must be configured.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
Object Model Prompt behavior for the SaveAs method must be configured.
<VulnDiscussion>This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically s...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.