Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • DTOO124 - Scripted Window Security

    <GroupDescription></GroupDescription>
    Group
  • Scripted Window Security must be enforced in PowerPoint.

    &lt;VulnDiscussion&gt;Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site t...
    Rule Medium Severity
  • DTOO127 - Add-ins are signed by Trusted Publisher

    <GroupDescription></GroupDescription>
    Group
  • Add-ins to Office applications must be signed by a Trusted Publisher.

    &lt;VulnDiscussion&gt;Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not con...
    Rule Medium Severity
  • DTOO119 - Turn off file validation

    <GroupDescription></GroupDescription>
    Group
  • Configuration for file validation must be enforced.

    &lt;VulnDiscussion&gt;Office File Validation helps detect and prevent a kind of exploit known as a file format attack or file fuzzing attack. File ...
    Rule Medium Severity
  • DTOO110 - Set default file block behavior

    <GroupDescription></GroupDescription>
    Group
  • Blocking as default file block opening behavior must be enforced.

    &lt;VulnDiscussion&gt;Users can open, view, or edit a large number of file types in PowerPoint 2013. Some file types are safer than others, as som...
    Rule Medium Severity
  • DTOO121 - Files from the Internet zone

    <GroupDescription></GroupDescription>
    Group
  • Files from the Internet zone must be opened in Protected View.

    &lt;VulnDiscussion&gt;This policy setting allows for determining if files downloaded from the Internet zone open in Protected View. If enabling thi...
    Rule Medium Severity
  • DTOO288 - Files in unsafe locations

    <GroupDescription></GroupDescription>
    Group
  • Files in unsafe locations must be opened in Protected View.

    &lt;VulnDiscussion&gt;This policy setting determines if files located in unsafe locations will open in Protected View. If unsafe locations have not...
    Rule Medium Severity
  • DTOO292 - Set document behavior

    <GroupDescription></GroupDescription>
    Group
  • Document behavior if file validation fails must be set.

    &lt;VulnDiscussion&gt;This policy key controls the behavior of how Office documents should be handled when failing file validation. By requiring su...
    Rule Medium Severity
  • DTOO293 - Turn off Protected View for attachments

    <GroupDescription></GroupDescription>
    Group
  • Attachments opened from Outlook must be in Protected View.

    &lt;VulnDiscussion&gt;This policy setting allows for determining if PowerPoint files in Outlook attachments open in Protected View. If enabling thi...
    Rule Medium Severity
  • DTOO319 - Disable Slide Update

    <GroupDescription></GroupDescription>
    Group
  • The configuration for Slide Update with counterparts must be disallowed.

    &lt;VulnDiscussion&gt;This setting controls whether users can link slides in a presentation with their counterparts in a PowerPoint Slide Library. ...
    Rule Medium Severity
  • DTOO501 - Disable user name and password in PowerPoint Viewer

    <GroupDescription></GroupDescription>
    Group
  • Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint Viewer.

    &lt;VulnDiscussion&gt;The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://usern...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules