Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • Trust Bar Notifications for unsigned application add-ins in Access must be disabled and blocked.

    &lt;VulnDiscussion&gt;This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are lo...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • VBA Macros not digitally signed must be blocked in Access.

    &lt;VulnDiscussion&gt;This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are pr...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Allowing Trusted Locations on the network must be disabled in Access.

    &lt;VulnDiscussion&gt;This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • The Macro Runtime Scan Scope must be enabled for all documents.

    &lt;VulnDiscussion&gt;This policy setting specifies for which documents the VBA Runtime Scan feature is enabled. If the feature is disabled for al...
    Rule Medium Severity
  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • Document metadata for rights managed Office Open XML files must be protected.

    &lt;VulnDiscussion&gt;This policy setting determines whether metadata is encrypted in Office Open XML files that are protected by Information Right...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Office client must be prevented from polling the SharePoint Server for published links.

    &lt;VulnDiscussion&gt;This policy setting controls whether Office 365 ProPlus applications can poll Office servers to retrieve lists of published l...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Custom user interface (UI) code must be blocked from loading in all Office applications.

    &lt;VulnDiscussion&gt;This policy setting controls whether Office 365 ProPlus applications load any custom user interface (UI) code included with a...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • ActiveX Controls must be initialized in Safe Mode.

    &lt;VulnDiscussion&gt;This policy setting specifies the Microsoft ActiveX initialization security level for all Microsoft Office applications. Acti...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.

    &lt;VulnDiscussion&gt;This policy setting controls whether macros can run in an Office 365 ProPlus application that is opened programmatically by a...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.

    &lt;VulnDiscussion&gt;This policy setting controls whether Office 365 ProPlus applications notify users when potentially unsafe features or content...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules