Microsoft Outlook 2010 STIG

Settings in this guidance assume a complete installation of Microsoft Office 2010 on the Windows 7 Platform. Registry paths and values identified in each control assume the use of Group Policy Administrative Templates. Installations not using Group Policies to administer Microsoft Office products may observe alternate registry paths for stored configuration values.

Details

Version / Release: V1R13

Published: 2018-04-04

Updated At: 2018-09-23 19:14:41

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-75853r1_rule DTOO104 - Outlook CCI-001170 MEDIUM Disable user name and password syntax from being used in URLs The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:[email protected] A malicious user might use this URL syntax to create a hyperlink that appears to open a legitimate Web s
    SV-33390r1_rule DTOO111 - Outlook CCI-001695 MEDIUM Enabling IE Bind to Object functionality must be present. Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the control is set in the registry, or if the security settings for the zone in which the control is located
    SV-33419r1_rule DTOO117 - Outlook CCI-001170 MEDIUM Saved from URL mark to assure Internet zone processing must be enforced. Typically, when Internet Explorer loads a Web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indicating the page was saved from a site on the Internet, Internet Explorer runs the page in the Internet se
    SV-33412r1_rule DTOO123 - Outlook CCI-001170 MEDIUM Navigation to URL's embedded in Office products must be blocked. To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by Office applications (for example, if a user clicks a link in an
    SV-33398r1_rule DTOO129 - Outlook CCI-001662 MEDIUM Links that invoke instances of IE from within an Office product must be blocked. The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can be controlled separately for instances of Internet Explorer spawned by Office applications (for example,
    SV-33558r2_rule DTOO272 - Outlook CCI-000366 MEDIUM Permit download of content from safe zones must be configured. By default, Outlook automatically downloads content from sites that are considered "safe," as defined in the Security tab of the Internet Options dialog box in Internet Explorer. This configuration could allow users to inadvertently download Web beacons t
    SV-33513r1_rule DTOO219 - Outlook CCI-000366 MEDIUM Access restriction settings for published calendars must be configured. Users can share their calendars with others by publishing them to the Microsoft Office Online Calendar Sharing Services and to a server that supports the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol. Office Online allows users to
    SV-33520r1_rule DTOO224 - Outlook CCI-000366 MEDIUM Recipients of sent email must be unable to be added to the safe sender's list. Users could send e-mail messages to request that they be taken off a mailing list. If the e-mail recipient is then automatically added to the Safe Senders List, future e mail messages from that address will no longer be sent to the users Junk E-mail folde
    SV-33523r1_rule DTOO234 - Outlook CCI-001170 MEDIUM Active X One-Off forms must be configured. Third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Controls (Microsoft Forms 2.0 controls and the Outlook Recipient and Body controls) are allowed in one-off forms, or so that all Act
    SV-33586r1_rule DTOO246 - Outlook CCI-001170 MEDIUM Scripts in One-Off Outlook forms must be disallowed. Malicious code can be included within Outlook forms, and such code could be executed when users open the form. By default, Outlook does not run scripts in forms in which the script and the layout are contained within the message. System AdministratorInfo
    SV-33540r1_rule DTOO273 - Outlook CCI-000366 MEDIUM IE Trusted Zones assumed 'trusted' must be blocked. Malicious users can send HTML e-mail messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether specific recipients open the message. Viewing an e-mail message that contains a Web beaco
    SV-33932r1_rule DTOO236 - Outlook CCI-001170 MEDIUM The Add-In Trust Level must be configured. Under normal circumstances the installed COM add-ins are applications that have been approved and intentionally deployed by the organization and therefore they should not pose a security threat. However, if malware has infected systems it is possible tha
    SV-33588r1_rule DTOO250 - Outlook CCI-002460 MEDIUM Object Model Prompt behavior for programmatic address books must be configured. If an untrusted application accesses the address book, the application could gain access to sensitive data and potentially change that data. By default, when an untrusted application attempts to access the address book programmatically, Outlook relies on
    SV-33578r1_rule DTOO241 - Outlook CCI-001662 MEDIUM Action to demote an EMail Level 1 attachment to Level 2 must be configured. Outlook uses two levels of security to restrict access to files attached to e-mail messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to di
    SV-33589r1_rule DTOO254 - Outlook CCI-002460 MEDIUM Object Model Prompt behavior for accessing User Property Formula must be configured. A custom form in Outlook could be used to gain access to sensitive address book data and potentially to change that data. By default, when a user tries to bind an address information field to a combination or formula custom field in a custom form, Outlook
    SV-33592r1_rule DTOO253 - Outlook CCI-002460 MEDIUM Object Model Prompt behavior for the SaveAs method must be configured. If an untrusted application uses the Save As command to programmatically save an item, the application could add malicious data to a user's inbox, a public folder, or an address book. By default, when an untrusted application attempts to use the Save As c
    SV-33593r1_rule DTOO251 - Outlook CCI-002460 MEDIUM Object Model Prompt behavior for programmatic access of user address data must be configured. If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentially change that data. This could result in mail being sent to the wrong party. By default, when an untrusted application attempts t
    SV-33594r1_rule DTOO252 - Outlook CCI-002460 MEDIUM Object Model Prompt behavior for Meeting and Task Responses must be configured. If an untrusted application programmatically responds to tasks or meeting requests, that application could impersonate a user response to the tasks or meeting requests with false information. By default, when an untrusted application attempts to respond
    SV-33595r1_rule DTOO249 - Outlook CCI-002460 MEDIUM Object Model Prompt for programmatic email send behavior must be configured. If an untrusted application programmatically sends e-mail, that application could send mail that includes malicious code, impersonate a user, or launch a denial-of-service attack by sending a large volume of mail to a user or group of users. By default,
    SV-33596r1_rule DTOO256 - Outlook CCI-000366 MEDIUM Trusted add-ins behavior for eMail must be configured. The Outlook object model includes entry points to access Outlook data, save data to specified locations, and send e-mail messages, all of which can be used by malicious application developers. To help protect these entry points, the Object Model Guard war
    SV-33506r1_rule DTOO226 - Outlook CCI-001150 MEDIUM Dial-up and Hang up Options for Outlook must be configured. By default, users can connect to their e-mail servers using dial-up networking if their accounts are configured appropriately. Dial-up connections are often used by mobile users who need to connect to the Internet from remote locations. Remote connections
    SV-33507r1_rule DTOO225 - Outlook CCI-001958 MEDIUM Outlook Dial-up options to Warn user before allowing switch in dial-up access must be configured. Users can connect to their e-mail servers using dial-up networking if their accounts are configured appropriately. Dial-up connections are often used by mobile users who need to connect to the Internet from remote locations. Remote connections are general
    SV-33524r1_rule DTOO237 - Outlook CCI-002007 MEDIUM The "remember password" for internet e-mail accounts must be disabled. As a security precaution, password caching for eMail Internet protocols such as POP3 or IMAP may lead to password discovery and eventually to data loss. An attacker that is able to access the users' profile may be able to acquire these cached passwords,
    SV-33581r1_rule DTOO243 - Outlook CCI-001662 MEDIUM Level 1 attachment close behaviors must be configured. To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, to restrict users' access to files attached to e-mail messages or other items. Outlook completely blocks access to Level 1 files by
    SV-33582r1_rule DTOO242 - Outlook CCI-001662 MEDIUM Prompting behavior for Level 1 attachments on sending must be configured. To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, to restrict access to files attached to e-mail messages or other items. Outlook completely blocks access to Level 1 files by defaul
    SV-33500r1_rule DTOO283 - Outlook CCI-000366 MEDIUM Disabling download full text of articles as HTML must be configured. Many RSS feeds use messages that contain a brief summary of a larger message or an article with a link to the full content. Users can configure Outlook to automatically download the linked content as message attachments for individual RSS feeds. If a feed
    SV-33597r1_rule DTOO277 - Outlook CCI-000366 MEDIUM Hyperlinks in suspected phishing e-mail messages must be disallowed. Outlook's Junk E-mail Filter evaluates each incoming message for possible spam or phishing content. Suspicious message detection is always turned on. By default, Outlook handles suspicious messages in two ways: • If the Junk E-mail Filter does not cons
    SV-33493r1_rule DTOO279 - Outlook CCI-001967 MEDIUM RPC encryption between Outlook and Exchange server must be enforced. The remote procedure call (RPC) communication channel between an Outlook client computer and an Exchange server is not encrypted. If a malicious person is able to eavesdrop on the network traffic between Outlook and the server, they might be able to acces
    SV-33521r1_rule DTOO221 - Outlook CCI-000366 MEDIUM Junk Mail UI must be configured. The Junk E-mail Filter in Outlook is designed to intercept the most obvious junk e-mail, or spam, and send it to users' Junk E-mail folders. The filter evaluates each incoming message based on several factors, including the time when the message was sent
    SV-33561r2_rule DTOO274 - Outlook CCI-000366 MEDIUM Internet with Safe Zones for Picture Download must be disabled. Malicious e-mail senders can send HTML e-mail messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether recipients open the messages. Viewing e-mail messages that contain Web beacons p
    SV-33562r2_rule DTOO275 - Outlook CCI-000366 MEDIUM Intranet with Safe Zones for automatic picture downloads must be configured. Malicious e-mail senders can send HTML e-mail messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether recipients open the messages. Viewing e-mail messages with Web beacons in them p
    SV-33580r1_rule DTOO240 - Outlook CCI-001662 MEDIUM The ability to display level 1 attachments must be disallowed. To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, to restrict access to files attached to e-mail messages or other items. Potentially harmful files can be classified into these two
    SV-33548r2_rule DTOO270 - Outlook CCI-000366 MEDIUM External content and pictures in HTML eMail must be displayed. Malicious email senders can send HTML email messages with embedded Web beacons, which are pictures and other content from external servers that can be used to track whether specific recipients open the message. Viewing an email message that contains a Web
    SV-33504r1_rule DTOO227 - Outlook CCI-002450 MEDIUM Digital signatures must be allowed. Outlook users can create and use signatures in e-mail messages. Users can add signatures to messages manually, and can also configure Outlook to automatically append signatures to new messages, to replies and forwards, or to all three. Signatures typicall
    SV-33509r1_rule DTOO230 - Outlook CCI-000381 MEDIUM Folders in non-default stores, set as folder home pages, must be disallowed. Outlook allows users to designate Web pages as home pages for personal or public folders. When a user clicks on a folder, Outlook displays the home page the user has assigned to it. Although this feature provides the opportunity to create powerful public
    SV-33510r1_rule DTOO233 - Outlook CCI-001170 MEDIUM Outlook Object Model scripts must be disallowed to run for public folders. In Outlook, folders can be associated with custom forms or folder home pages that include scripts that access the Outlook object model. These scripts can add functionality to the folders and items contained within, but dangerous scripts can pose security
    SV-33511r1_rule DTOO232 - Outlook CCI-001170 MEDIUM Outlook Object Model scripts must be disallowed to run for shared folders. In Outlook, folders can be associated with custom forms or folder home pages that include scripts that access the Outlook object model. These scripts can add functionality to the folders and items contained within, but dangerous scripts can pose security
    SV-33499r1_rule DTOO285 - Outlook CCI-000381 MEDIUM Do not include Internet Calendar Integration in Outlook must be enforced. The Internet Calendar feature in Outlook enables users to publish calendars online (using the webcal:// protocol) and subscribe to calendars that others have published. When users subscribe to an Internet calendar, Outlook queries the calendar at regular
    SV-33572r1_rule DTOO269 - Outlook CCI-000366 MEDIUM Attachments using generated name for secure temporary folders must be configured. The Secure Temporary Files folder is used to store attachments when they are opened in e-mail. By default, Outlook generates a random name for the Secure Temporary Files folder and saves it in the Temporary Internet Files folder. You can use this setting
    SV-33486r1_rule DTOO280 - Outlook CCI-001967 MEDIUM Authentication with Exchange Server must be required. Exchange Server supports the Kerberos authentication protocol and NTLM for authentication. The Kerberos protocol is the more secure authentication method and is supported on Windows 2000 Server and later versions. NTLM authentication is supported in pre-W
    SV-33487r2_rule DTOO278 - Outlook CCI-000366 MEDIUM Automatically configure user profile based on Active Directory primary SMTP address must be enforced. If a user is joined to a domain in an Active Directory environment and does not have an e-mail account configured, Outlook populates the e-mail address field of the New Account Wizard with the primary SMTP address of the user who is currently logged on to
    SV-33496r1_rule DTOO284 - Outlook CCI-001169 MEDIUM Automatic download of Internet Calendar appointment attachments must be disallowed. Files attached to Internet Calendar appointments could contain malicious code that could be used to compromise a computer. By default, Outlook does not download attachments when retrieving Internet Calendar appointments. System AdministratorInformation As
    SV-33529r1_rule DTOO271 - Outlook CCI-000366 MEDIUM Automatic download content for email in Safe Senders list must be disallowed. Malicious e-mail senders can send HTML e-mail messages with embedded Web beacons, or pictures and other content from external servers that can be used to track whether specific recipients have opened a message. Viewing an e-mail message that contains a We
    SV-33508r1_rule DTOO229 - Outlook CCI-000366 MEDIUM Outlook must be enforced as the default email, calendar, and contacts program. Outlook is made the default program for E-mail, contacts, and calendar services when it is installed, although users can designate other programs as the default programs for these services. If another application is used to provide these services and your
    SV-33563r1_rule DTOO260 - Outlook CCI-000803 MEDIUM Message formats must be set to use SMime. E-mail typically travels over open networks and is passed from server to server. Messages are therefore vulnerable to interception, and attackers might read or alter their contents. It is therefore important to have a mechanism for signing messages and pr
    SV-33574r2_rule DTOO268 - Outlook CCI-000185 MEDIUM Missing Root Certificates warning must be enforced. When Outlook accesses a certificate, it validates that it can trust the certificate by examining the root certificate of the issuing CA. If the root certificate can be trusted, then certificates issued by the CA can also be trusted. If Outlook cannot fin
    SV-33577r1_rule DTOO239 - Outlook CCI-000366 MEDIUM Outlook Security Mode must be configured to use Group Policy settings. If users can configure security themselves, they might choose levels of security that leave their computers vulnerable to attack. By default, Outlook users can configure security for themselves, and Outlook ignores any security-related settings that are c
    SV-33505r2_rule DTOO228 - Outlook CCI-002418 MEDIUM Plain Text Options for outbound email must be configured. If outgoing mail is formatted in certain ways, for example if attachments are encoded in UUENCODE format, attackers might manipulate the messages for their own purposes. If UUENCODE formatting is used, an attacker could manipulate the encoded attachment t
    SV-33514r1_rule DTOO217 - Outlook CCI-000366 MEDIUM Publishing to a Web Distributed and Authoring (DAV) server must be prevented. Outlook users can share their calendars with others by publishing them to a server that supports the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol. Unlike the Microsoft Office Online Calendar Sharing Service, which allows users to
    SV-33515r1_rule DTOO216 - Outlook CCI-000366 MEDIUM Publishing calendars to Office Online must be prevented. Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Sharing Service. Users can control who can view their calendar and at what level of detail. If your organization has policies that gov
    SV-33525r1_rule DTOO238 - Outlook CCI-001170 MEDIUM Users customizing attachment security settings must be prevented. All installed trusted COM addins can be trusted. Exchange Settings for the addins still override if present and this option is selectedSystem AdministratorInformation Assurance Officer
    SV-33518r1_rule DTOO214 - Outlook CCI-000366 MEDIUM Read EMail as plain text must be enforced. Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By default, Outlook displays e-mail messages in whatever format they were received in. System AdministratorInformation Assurance Officer
    SV-33519r1_rule DTOO215 - Outlook CCI-000366 MEDIUM Read signed email as plain text must be enforced. Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. By default, Outlook displays digitally signed e-mail messages in the format they were received in. System AdministratorInformation Assuranc
    SV-33583r1_rule DTOO244 - Outlook CCI-001662 MEDIUM Level 1 file extensions must be blocked and not removed. Malicious code is often spread through e-mail. Some viruses have the ability to send copies of themselves to other people in the victim's Address Book or Contacts list, and such potentially harmful files can affect the computers of unwary recipients.Syste
    SV-33585r1_rule DTOO245 - Outlook CCI-001662 MEDIUM Level 2 file extensions must be blocked and not removed. Malicious code is often spread through e-mail. Some viruses have the ability to send copies of themselves to other people in the victim's Address Book or Contacts list, and such potentially harmful files can affect the computers of unwary recipients. Outl
    SV-33516r1_rule DTOO218 - Outlook CCI-000366 MEDIUM Level of calendar details that a user can publish must be restricted. Outlook users can share their calendars with selected others by publishing them to the Microsoft Office Outlook Calendar Sharing Service. Users can choose from three levels of detail: • Availability only. Authorized visitors will see the user's time mar
    SV-33517r1_rule DTOO220 - Outlook CCI-000366 MEDIUM Upload method for publishing calendars to Office Online must be restricted. When users publish their calendar to Microsoft Office Online using the Microsoft Office Outlook Calendar Sharing Service, Outlook updates the calendars online at regular intervals unless they click Advanced and select Single Upload: Updates will not be up
    SV-33880r1_rule DTOO267 - Outlook CCI-000185 MEDIUM Retrieving of CRL data must be set for online action. This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Certificate revocation lists (CRLs) are lists of digital certificates that have been revoked by their controlling certificate authorit
    SV-33565r1_rule DTOO262 - Outlook CCI-000803 MEDIUM Run in FIPS compliant mode must be enforced. Outlook can run in a mode that complies with Federal Information Processing Standards (FIPS), a set of standards published by the National Institute of Standards and Technology (NIST) for use by non-military United States government agencies and by govern
    SV-33566r1_rule DTOO257 - Outlook CCI-000803 MEDIUM S/Mime interoperability with external clients for message handling must be configured. In some situations, administrators might wish to use an external program, such as an add-in, to handle S/MIME message decryption. If your organization works with encrypted messages that the decryption functionality in Outlook cannot handle appropriately,
    SV-33568r1_rule DTOO266 - Outlook CCI-000366 MEDIUM Automatic sending s/Mime receipt requests must be disallowed. Incoming signed or encrypted messages might include S/MIME receipt requests. S/MIME receipts provide confirmation that messages are received unaltered, and can include information about who opened the message and when it was opened. By default, when users
    SV-33598r1_rule DTOO276 - Outlook CCI-001662 MEDIUM Always warn on untrusted macros must be enforced. To protect users from dangerous code, the Outlook default configuration disables all macros that are not trusted, including unsigned macros, macros with expired or invalid signatures, and macros with valid signatures from publishers who are not on users'
    SV-33570r1_rule DTOO264 - Outlook CCI-000366 MEDIUM All signed messages as clear signed messages must be configured. When users sign e-mail messages with their digital signature and send them, Outlook uses the signature's private key to encrypt the digital signature but sends the messages as clear text, unless they are encrypted separately. If users change this function
    SV-33587r1_rule DTOO247 - Outlook CCI-002460 MEDIUM Custom Outlook Object Model (OOM) action execution prompts must be configured. Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom actions can be created that reply to messages in ways that circumvent the Outlook model's programmatic send protections. By default,
    SV-33571r1_rule DTOO265 - Outlook CCI-000185 MEDIUM Warning about invalid signatures must be enforced. If users open e-mail messages that include invalid digital signatures, Outlook displays a warning dialog box. Users can decide whether they want to be warned about invalid signatures in the future. If users are not notified about invalid signatures, they
    SV-33501r1_rule DTOO281 - Outlook CCI-000381 MEDIUM RSS feed synchronization with Common Feed List must be disallowed. The Common Feed list is a hierarchical set of RSS feeds to which clients such as Outlook 2010, the Feeds list in Internet Explorer, and the Feed Headlines Sidebar gadget in Windows Vista can subscribe. If Outlook subscribes to a very large feed list, perf
    SV-33522r1_rule DTOO223 - Outlook CCI-000366 MEDIUM Trust EMail from senders in receiver's contact list must be enforced. E-mail addresses in users' Contacts list are treated as safe senders for purposes of filtering junk e-mail. If this configuration is changed, e-mail from users' Contacts might be misclassified as junk and cause important information to be lost.System Admi
    SV-33502r1_rule DTOO282 - Outlook CCI-000381 MEDIUM RSS Feeds must be disallowed. Users can subscribe to RSS feeds from within Outlook and read RSS items like e-mail messages. If your organization has policies that govern the use of external resources such as RSS feeds, allowing users to subscribe to the RSS feed in Outlook might enabl
    SV-33512r1_rule DTOO231 - Outlook CCI-000381 MEDIUM Dragging Unicode eMail messages to file system must be disallowed. When users drag e-mail messages from Outlook to a Windows Explorer window or to their Desktop, Outlook creates a .msg file using the native character encoding format for the configured locale (the so-called "ANSI" format). If this setting is Enabled, Outl
    SV-33503r1_rule DTOO286 - Outlook CCI-000381 MEDIUM User Entries to Server List must be disallowed. If users are able to manually enter the addresses of servers that are not approved by the organization, they could use servers that do not meet your organization's information security requirements, which could cause sensitive information to be at risk. B
    SV-33782r1_rule DTOO126 - Outlook CCI-001662 MEDIUM Add-on Management functionality must be allowed. Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or other malicious code. Disabling or not configuring this setting could allow malicious code or users to become
    SV-33790r1_rule DTOO209 - Outlook CCI-001695 MEDIUM Protection from zone elevation must be enforced. Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest security restrictions and reside in the Local Machine zone, making this security zone a prime target for malicio
    SV-33793r1_rule DTOO211 - Outlook CCI-002460 MEDIUM ActiveX Installs must be configured for proper restriction. Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in the browser like the other types of HTML or Microsoft Silverlight-based controls. Disabling or not confi
    SV-33800r1_rule DTOO132 - Outlook CCI-001169 MEDIUM File Downloads must be configured for proper restrictions. Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferences may also allow the download to occur without prompting or interacting with the user. Even if Interne
    SV-33806r1_rule DTOO124 - Outlook CCI-001695 MEDIUM Scripted Window Security must be enforced. Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the users' computers in some manner. Disabling or not configuring this setting allows unknown websites to: -Crea
    SV-33857r1_rule DTOO128 - Outlook CCI-001170 MEDIUM Data Execution Prevention must be enforced. Data Execution Prevention (DEP) is a set of hardware and software technologies performing additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. En
    SV-34101r1_rule DTOO313 - Outlook CCI-000381 MEDIUM Automatically downloading enclosures on RSS must be disallowed. This policy setting allows you to control whether Outlook automatically downloads enclosures on RSS items. System AdministratorInformation Assurance Officer
    SV-34103r1_rule DTOO344 - Outlook CCI-000366 MEDIUM Outlook Rich Text options must be set for converting to plain text format. Outlook automatically converts RTF formatted messages that are sent over the Internet to HTML format, so that the message formatting is maintained and attachments are received. This setting controls how Outlook sends Rich Text Format (RTF) messages to Int
    SV-34105r1_rule DTOO314 - Outlook CCI-000366 MEDIUM Default message format must be set to use Plain Text. Outlook uses HTML as the default e-mail format, but users can choose a format other than the default when composing messages. This setting controls the default message format in Outlook. System AdministratorInformation Assurance Officer
    SV-34106r1_rule DTOO315 - Outlook CCI-000366 MEDIUM Outlook must be configured not to prompt users to choose security settings if default settings fail. Prompts the user to choose security settings if default settings fail; uncheck to automatically select. System AdministratorInformation Assurance Officer
    SV-34107r1_rule DTOO316 - Outlook CCI-002450 MEDIUM Outlook minimum encryption key length settings must be set. This setting allows you to set the minimum key length for an encrypted e-mail message.System AdministratorInformation Assurance Officer
    SV-34109r1_rule DTOO317 - Outlook CCI-000366 MEDIUM Replies or forwards to signed/encrypted messages must be signed/encrypted. This setting controls whether replies and forwards to signed/encrypted mail should also be signed/encrypted. System AdministratorInformation Assurance Officer
    SV-34110r1_rule DTOO320 - Outlook CCI-000366 MEDIUM Check e-mail addresses against addresses of certificates being used must be disallowed. This policy setting controls whether Outlook verifies the user's e-mail address with the address associated with the certificate used for signing. System AdministratorInformation Assurance Officer
    SV-55984r2_rule DTOO425 CCI-000366 MEDIUM Text in Outlook that represents Internet and network paths must not be automatically turned into hyperlinks. The ability of Outlook to automatically turn text that represents Internet and network paths into hyperlinks would allow users to click on those hyperlinks in email messages and access malicious or otherwise harmful websites.System AdministratorInformatio