I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
Trust Bar Notifications for unsigned application add-ins in Access must be disabled and blocked.
<VulnDiscussion>This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are lo...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
VBA Macros not digitally signed must be blocked in Access.
<VulnDiscussion>This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are pr...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
Allowing Trusted Locations on the network must be disabled in Access.
<VulnDiscussion>This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
The Macro Runtime Scan Scope must be enabled for all documents.
<VulnDiscussion>This policy setting specifies for which documents the VBA Runtime Scan feature is enabled. If the feature is disabled for al...Rule Medium Severity -
SRG-APP-000429
<GroupDescription></GroupDescription>Group -
Document metadata for rights managed Office Open XML files must be protected.
<VulnDiscussion>This policy setting determines whether metadata is encrypted in Office Open XML files that are protected by Information Right...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Office client must be prevented from polling the SharePoint Server for published links.
<VulnDiscussion>This policy setting controls whether Office 365 ProPlus applications can poll Office servers to retrieve lists of published l...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Custom user interface (UI) code must be blocked from loading in all Office applications.
<VulnDiscussion>This policy setting controls whether Office 365 ProPlus applications load any custom user interface (UI) code included with a...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
ActiveX Controls must be initialized in Safe Mode.
<VulnDiscussion>This policy setting specifies the Microsoft ActiveX initialization security level for all Microsoft Office applications. Acti...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.
<VulnDiscussion>This policy setting controls whether macros can run in an Office 365 ProPlus application that is opened programmatically by a...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.
<VulnDiscussion>This policy setting controls whether Office 365 ProPlus applications notify users when potentially unsafe features or content...Rule Medium Severity -
SRG-APP-000231
<GroupDescription></GroupDescription>Group -
Office applications must be configured to specify encryption type in password-protected Office 97-2003 files.
<VulnDiscussion>This policy setting enables you to specify an encryption type for password-protected Office 97-2003 files. If you enable thi...Rule Medium Severity -
SRG-APP-000231
<GroupDescription></GroupDescription>Group -
Office applications must be configured to specify encryption type in password-protected Office Open XML files.
<VulnDiscussion>This policy setting allows you to specify an encryption type for Office Open XML files. If you enable this policy setting, y...Rule Medium Severity -
SRG-APP-000340
<GroupDescription></GroupDescription>Group -
Users must be prevented from creating new trusted locations in the Trust Center.
<VulnDiscussion>This policy setting controls whether trusted locations can be defined by users, the Office Customization Tool (OCT), and Grou...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Office applications must not load XML expansion packs with Smart Documents.
<VulnDiscussion>This policy setting controls whether Office 365 ProPlus applications can load an XML expansion pack manifest file with a Smar...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
The load of controls in Forms3 must be blocked.
<VulnDiscussion>This policy setting allows the user to control how ActiveX controls in UserForms should be initialized based upon whether the...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
Add-on Management must be enabled for all Office 365 ProPlus programs.
<VulnDiscussion>Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons ma...Rule Medium Severity -
SRG-APP-000179
<GroupDescription></GroupDescription>Group -
Consistent MIME handling must be enabled for all Office 365 ProPlus programs.
<VulnDiscussion>Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified ...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
User name and password must be disabled in all Office programs.
<VulnDiscussion>The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://usern...Rule Medium Severity -
SRG-APP-000207
<GroupDescription></GroupDescription>Group -
The Information Bar must be enabled in all Office programs.
<VulnDiscussion>This policy setting controls whether Office 365 ProPlus applications notify users when potentially unsafe features or content...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The Local Machine Zone Lockdown Security must be enabled in all Office programs.
<VulnDiscussion>Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local compute...Rule Medium Severity -
SRG-APP-000179
<GroupDescription></GroupDescription>Group -
The MIME Sniffing safety feature must be enabled in all Office programs.
<VulnDiscussion>Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified ...Rule Medium Severity -
SRG-APP-000210
<GroupDescription></GroupDescription>Group -
Navigate URL must be enabled in all Office programs.
<VulnDiscussion>To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be c...Rule Medium Severity -
SRG-APP-000179
<GroupDescription></GroupDescription>Group -
Object Caching Protection must be enabled in all Office programs.
<VulnDiscussion>Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified ...Rule Medium Severity -
SRG-APP-000112
<GroupDescription></GroupDescription>Group -
Protection from zone elevation must be enabled in all Office programs.
<VulnDiscussion>Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local compute...Rule Medium Severity -
SRG-APP-000488
<GroupDescription></GroupDescription>Group -
ActiveX installation restriction must be enabled in all Office programs.
<VulnDiscussion>Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.