Microsoft Outlook 2007
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V4R13). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 77 rules matched cleanly.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - Outlook
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-18181r1_rule
Checks: C-17855r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16958r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Disable user name and password” will be set to “Enabled” and ‘outlook.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - Outlook
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-18188r1_rule
Checks: C-17867r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-16964r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Bind to Object” will be set to “Enabled” and ‘outlook.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - Outlook
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-18203r1_rule
Checks: C-17886r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17050r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Saved from URL” will be set to “Enabled” and ‘outlook.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - Outlook
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-18602r1_rule
Checks: C-18844r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17444r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Navigate URL” will be set to “Enabled” and ‘outlook.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - Outlook
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-18213r1_rule
Checks: C-17897r1_chk
If Office 2007 PRE SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding. If Office 2007 SP2: The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-17058r1_fix
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2007 system (Machine) -> Security Settings -> IE Security “Block popups” will be set to “Enabled” and ‘outlook.exe’ is checked. Note: In Office SP2 adm use, filtering in GPEDIT.MSC should have deselected any checks in "Only show configured policy settings" box, and "Only show policy settings that can be fully managed" box, in order to view the hive within the GP Console for policy use.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO272 - Outlook
- Vuln IDs
-
- V-17470
- Rule IDs
-
- SV-35249r3_rule
Checks: C-18805r4_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Do not permit download of content from safe zones” will be set to “Disabled”. This will allow download of content from safe zones. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value UnblockSafeZone is REG_DWORD = 1, this is not a finding.
Fix: F-17398r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Do not permit download of content from safe zones” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO219 - Outlook
- Vuln IDs
-
- V-17546
- Rule IDs
-
- SV-18641r1_rule
Checks: C-18857r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Access to published calendars” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\PubCal Criteria: If the value RestrictedAccessOnly is REG_DWORD = 1, this is not a finding.
Fix: F-17468r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Access to published calendars” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO224 - Outlook
- Vuln IDs
-
- V-17558
- Rule IDs
-
- SV-18655r1_rule
Checks: C-18859r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Add e-mail recipients to users' Safe Senders Lists” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value JunkMailTrustOutgoingRecipients is REG_DWORD = 0, this is not a finding.
Fix: F-17474r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Add e-mail recipients to users' Safe Senders Lists” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO234 - Outlook
- Vuln IDs
-
- V-17559
- Rule IDs
-
- SV-18657r1_rule
Checks: C-18860r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Allow Active X One Off Forms” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security\AllowActiveXOneOffForms If the Registry key exists, this is a finding.
Fix: F-17475r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Allow Active X One Off Forms” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO246 - Outlook
- Vuln IDs
-
- V-17562
- Rule IDs
-
- SV-18663r1_rule
Checks: C-18863r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Custom Form Security “Allow scripts in one-off Outlook forms” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix: F-17479r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Custom Form Security “Allow scripts in one-off Outlook forms” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO273 - Outllook
- Vuln IDs
-
- V-17564
- Rule IDs
-
- SV-18667r1_rule
Checks: C-18865r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Block Trusted Zones” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value TrustedZone is REG_DWORD = 0, this is not a finding.
Fix: F-17481r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Block Trusted Zones” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO236 - Outlook
- Vuln IDs
-
- V-17566
- Rule IDs
-
- SV-18671r1_rule
Checks: C-18867r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Configure Add-In Trust Level” will be set to “Enabled (Trust all loaded and installed COM addins)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value AddinTrust is REG_DWORD = 1, this is not a finding.
Fix: F-17484r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Configure Add-In Trust Level” will be set to “Enabled (Trust all loaded and installed COM addins)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO255 - Outlook
- Vuln IDs
-
- V-17567
- Rule IDs
-
- SV-18673r1_rule
Checks: C-18868r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when accessing address information via UserProperties.Find” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMAddressUserPropertyFind is REG_DWORD = 0, this is not a finding.
Fix: F-17485r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when accessing address information via UserProperties.Find” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO250 - Outlook
- Vuln IDs
-
- V-17568
- Rule IDs
-
- SV-18675r1_rule
Checks: C-18869r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when accessing an address book” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMAddressBookAccess is REG_DWORD = 0, this is not a finding.
Fix: F-17486r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when accessing an address book” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO241 - Outlook
- Vuln IDs
-
- V-17569
- Rule IDs
-
- SV-18677r1_rule
Checks: C-18870r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Allow users to demote attachments to Level 2” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value AllowUsersToLowerAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-17487r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Allow users to demote attachments to Level 2” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO254 - Outlook
- Vuln IDs
-
- V-17570
- Rule IDs
-
- SV-18679r1_rule
Checks: C-18871r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt When accessing the Formula property of a UserProperty object” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-17488r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt When accessing the Formula property of a UserProperty object” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO253 - Outlook
- Vuln IDs
-
- V-17571
- Rule IDs
-
- SV-18681r1_rule
Checks: C-18872r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when executing Save As” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMSaveAs is REG_DWORD = 0, this is not a finding.
Fix: F-17489r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when executing Save As” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO251 - Outlook
- Vuln IDs
-
- V-17572
- Rule IDs
-
- SV-18683r1_rule
Checks: C-18873r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when reading address information” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMAddressInformationAccess is REG_DWORD = 0, this is not a finding.
Fix: F-17490r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when reading address information” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO252 - Outlook
- Vuln IDs
-
- V-17573
- Rule IDs
-
- SV-18685r1_rule
Checks: C-18874r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when responding to meeting and task requests” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMMeetingTaskRequestResponse is REG_DWORD = 0, this is not a finding.
Fix: F-17491r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when responding to meeting and task requests” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO249 - Outlook
- Vuln IDs
-
- V-17574
- Rule IDs
-
- SV-18687r1_rule
Checks: C-18875r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when sending mail” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMSend is REG_DWORD = 0, this is not a finding.
Fix: F-17492r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when sending mail” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO256 - Outlook
- Vuln IDs
-
- V-17575
- Rule IDs
-
- SV-18689r1_rule
Checks: C-18876r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins “Configure trusted add-ins” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security\TrustedAddins If the registry key exists, this is a finding.
Fix: F-17493r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins “Configure trusted add-ins” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO226 - Outlook
- Vuln IDs
-
- V-17585
- Rule IDs
-
- SV-18708r1_rule
Checks: C-18885r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail Setup “Dial–up options” will be set to “Enabled” and Hang up when finished sending, receiving, or updating is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value Hangup after Spool is REG_DWORD = 1, this is not a finding.
Fix: F-17503r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail Setup “Dial–up options” will be set to “Enabled” and Hang up when finished sending, receiving, or updating is selected.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO225 - Outlook
- Vuln IDs
-
- V-17586
- Rule IDs
-
- SV-18710r1_rule
Checks: C-18886r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail Setup “Dial–up options” will be set to “Enabled” and Warn before switching dial-up connection is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail\ Criteria: If the value Warn on Dialup is REG_DWORD = 1, this is not a finding.
Fix: F-17504r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail Setup “Dial–up options” will be set to “Enabled” and Warn before switching dial-up connection is selected.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO237 - Outlook
- Vuln IDs
-
- V-17587
- Rule IDs
-
- SV-18712r1_rule
Checks: C-18887r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Disable ‘Remember password’ for Internet e-mail accounts” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value EnableRememberPwd is REG_DWORD = 0, this is not a finding.
Fix: F-17505r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Disable ‘Remember password’ for Internet e-mail accounts” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO243 - Outlook
- Vuln IDs
-
- V-17601
- Rule IDs
-
- SV-18729r1_rule
Checks: C-18903r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when closing an item” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value DontPromptLevel1AttachClose is REG_DWORD = 0, this is not a finding.
Fix: F-17519r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when closing an item” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO242 - Outlook
- Vuln IDs
-
- V-17602
- Rule IDs
-
- SV-18731r1_rule
Checks: C-18904r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when sending an item” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value DontPromptLevel1AttachSend is REG_DWORD = 0, this is not a finding.
Fix: F-17520r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when sending an item” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO261 - Outlook
- Vuln IDs
-
- V-17604
- Rule IDs
-
- SV-18735r1_rule
Checks: C-18906r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Do not provide Continue option on Encryption warning dialog boxes” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value DisableContinueEncryption is REG_DWORD = 0, this is not a finding.
Fix: F-17522r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Do not provide Continue option on Encryption warning dialog boxes” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO283 - Outlook
- Vuln IDs
-
- V-17610
- Rule IDs
-
- SV-18743r1_rule
Checks: C-18908r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds “Download full text of articles as HTML attachments” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\RSS Criteria: If the value EnableFullTextHTML is REG_DWORD = 0, this is not a finding.
Fix: F-17524r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds “Download full text of articles as HTML attachments” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO277 - Outlook
- Vuln IDs
-
- V-17613
- Rule IDs
-
- SV-18749r1_rule
Checks: C-18911r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Trust Center “Enable links in e-mail messages” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-17527r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Trust Center “Enable links in e-mail messages” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO279 - Outlook
- Vuln IDs
-
- V-17615
- Rule IDs
-
- SV-18752r1_rule
Checks: C-18912r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Exchange “Enable RPC encryption” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\RPC Criteria: If the value EnableRPCEncryption is REG_DWORD = 1, this is not a finding.
Fix: F-17529r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Exchange “Enable RPC encryption” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO221 - Outlook
- Vuln IDs
-
- V-17624
- Rule IDs
-
- SV-18766r1_rule
Checks: C-18916r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Hide Junk Mail UI” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook Criteria: If the value DisableAntiSpam is REG_DWORD = 0, this is not a finding.
Fix: F-17534r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Hide Junk Mail UI” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO274 - Outlook
- Vuln IDs
-
- V-17630
- Rule IDs
-
- SV-18775r3_rule
Checks: C-18918r5_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Include Internet in Safe Zones for Automatic Picture Download” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-17540r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Include Internet in Safe Zones for Automatic Picture Download” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO275 - Outlook
- Vuln IDs
-
- V-17634
- Rule IDs
-
- SV-18779r3_rule
Checks: C-18919r3_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Include Intranet in Safe Zones for Automatic Picture Download” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-17541r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Include Intranet in Safe Zones for Automatic Picture Download” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO240 - Outlook
- Vuln IDs
-
- V-17671
- Rule IDs
-
- SV-18838r1_rule
Checks: C-18942r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Display Level 1 attachments” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-17569r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Display Level 1 attachments” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO270 - Outlook
- Vuln IDs
-
- V-17672
- Rule IDs
-
- SV-18840r1_rule
Checks: C-18943r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Display pictures and external content in HTML e-mail” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value BlockExtContent is REG_DWORD = 1, this is not a finding.
Fix: F-17570r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Display pictures and external content in HTML e-mail” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO227 - Outlook
- Vuln IDs
-
- V-17673
- Rule IDs
-
- SV-18842r1_rule
Checks: C-18944r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail format “Do not allow creating, replying, or forwarding signatures for e-mail messages” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\MailSettings Criteria: If the value DisableSignatures is REG_DWORD = 0, this is not a finding.
Fix: F-17571r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail format “Do not allow creating, replying, or forwarding signatures for e-mail messages” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO230 - Outlook
- Vuln IDs
-
- V-17674
- Rule IDs
-
- SV-18844r1_rule
Checks: C-18945r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Do not allow folders in non-default stores to be set as folder home pages” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value NonDefaultStoreScript is REG_DWORD = 0, this is not a finding.
Fix: F-17572r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Do not allow folders in non-default stores to be set as folder home pages” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO233 - Outlook
- Vuln IDs
-
- V-17675
- Rule IDs
-
- SV-18846r1_rule
Checks: C-18946r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for public folders” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PublicFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-17573r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for public folders” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO232 - Outlook
- Vuln IDs
-
- V-17676
- Rule IDs
-
- SV-18848r1_rule
Checks: C-18947r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for shared folders” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value SharedFolderScript is REG_DWORD = 0, this is not a finding
Fix: F-17574r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for shared folders” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO263 - Outlook
- Vuln IDs
-
- V-17677
- Rule IDs
-
- SV-18850r1_rule
Checks: C-18948r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Do not check e-mail address against address of certificates being used” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value SupressNameChecks is REG_DWORD = 1, this is not a finding.
Fix: F-17575r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Do not check e-mail address against address of certificates being used” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO285 - Outlook
- Vuln IDs
-
- V-17678
- Rule IDs
-
- SV-18852r1_rule
Checks: C-18949r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Internet Calendars “Do not include Internet Calendar integration in Outlook” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\WebCal Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-17576r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Internet Calendars “Do not include Internet Calendar integration in Outlook” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO269 - Outlook
- Vuln IDs
-
- V-17733
- Rule IDs
-
- SV-18910r1_rule
Checks: C-18999r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography -> Signature Status dialog box “Attachment Secure Temporary Folder” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security\OutlookSecureTempFolder If the registry key exists, this is a finding.
Fix: F-17633r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography -> Signature Status dialog box “Attachment Secure Temporary Folder” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO280 - Outlook
- Vuln IDs
-
- V-17734
- Rule IDs
-
- SV-18912r1_rule
Checks: C-19000r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Exchange “Authentication with Exchange Server” will be set to “Enabled (Kerberos/NTLM Password Authentication)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value AuthenticationService is REG_DWORD = 9, this is not a finding.
Fix: F-17634r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Exchange “Authentication with Exchange Server” will be set to “Enabled (Kerberos/NTLM Password Authentication)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO278 - Outlook
- Vuln IDs
-
- V-17736
- Rule IDs
-
- SV-18916r2_rule
Checks: C-19001r3_chk
NOTE: If Outlook 2007 is configured to access DoD Enterprise Email, this check is not applicable. The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Exchange “Automatically configure profile based on Active Directory Primary SMTP address” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\AutoDiscover Criteria: If the value ZeroConfigExchange is REG_DWORD = 1, this is not a finding.
Fix: F-17635r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Exchange “Automatically configure profile based on Active Directory Primary SMTP address” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO284 - Outlook
- Vuln IDs
-
- V-17738
- Rule IDs
-
- SV-18918r1_rule
Checks: C-19002r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Internet Calendars “Automatically download attachments” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\WebCal Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-17636r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> Internet Calendars “Automatically download attachments” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO271 - Outlook
- Vuln IDs
-
- V-17739
- Rule IDs
-
- SV-18920r1_rule
Checks: C-19003r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value UnblockSpecificSenders is REG_DWORD = 0, this is not a finding.
Fix: F-17637r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Automatic Picture Download Settings “Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO222 - Outlook
- Vuln IDs
-
- V-17748
- Rule IDs
-
- SV-18935r1_rule
Checks: C-19010r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Junk E-mail protection level” will be set to “Enabled (Low)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value JunkMailProtection is REG_DWORD = 6 (hex or decimal), this is not a finding.
Fix: F-17647r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Junk E-mail protection level” will be set to “Enabled (Low)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO229 - Outlook
- Vuln IDs
-
- V-17753
- Rule IDs
-
- SV-18946r1_rule
Checks: C-19016r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other “Make Outlook the default program for E-mail, Contacts, and Calendar” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\General Criteria: If the value Check Default Client is REG_DWORD = 1, this is not a finding.
Fix: F-17653r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other “Make Outlook the default program for E-mail, Contacts, and Calendar” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO260 - Outlook
- Vuln IDs
-
- V-17755
- Rule IDs
-
- SV-18948r1_rule
Checks: C-19017r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Message Formats” will be set to “Enabled (S\MIME)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value MsgFormats is REG_DWORD = 1, this is not a finding.
Fix: F-17654r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Message Formats” will be set to “Enabled (S\MIME)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO268 - Outlook
- Vuln IDs
-
- V-17756
- Rule IDs
-
- SV-18950r2_rule
Checks: C-39975r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography -> Signature Status dialog box "Missing root certificates" will be set to "Enabled (error)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value SigStatusNoTrustDecision is REG_DWORD = 2, this is not a finding.
Fix: F-17655r2_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography -> Signature Status dialog box “Missing root certificates” will be set to “Enabled (error)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO239 - Outlook
- Vuln IDs
-
- V-17760
- Rule IDs
-
- SV-18958r1_rule
Checks: C-19023r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings “Outlook Security Mode” will be set to “Enabled (Use Outlook Security Group Policy)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value AdminSecurityMode is REG_DWORD = 3, this is not a finding.
Fix: F-17659r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings “Outlook Security Mode” will be set to “Enabled (Use Outlook Security Group Policy)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO228 - Outlook
- Vuln IDs
-
- V-17761
- Rule IDs
-
- SV-18960r1_rule
Checks: C-19024r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail format -> Internet Formatting “Plain text options” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\MailSettings\ PlainWrapLen If the Registry key exists, this is a finding. OR The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail format -> Internet Formatting "Plain text -> options" will be set to "Enabled" where line length is "132" and that NO Check is visible in the "Encode all attachments in UUENCODE format when sending a plain text message" checkbox option. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Common\MailSettings\ PlainWrapLen Criteria: If the value PlainWrapLen is REG_DWORD = 132, this is not a finding. AND HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail. Criteria: If the value Message Plain Format MIME is REG_DWORD = 1, this is not a finding. (Note: Any value for HKCU\Software\Policies\Microsoft\Office\12.0\Common\MailSettings\PlainWrapLen is acceptable.) NOTE: This check is compliant as long as it is matched and defined by setting exactly to one of the above methods.
Fix: F-17660r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Mail format -> Internet Formatting "Plain text options" will be set to "Disabled" OR will be set to "Enabled, automatically wrap text option will be set to 132, and no check selection will be included in the Encode all attachments in UUENCODE format when sending a plain text message" checkbox option.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO217 - Outlook
- Vuln IDs
-
- V-17762
- Rule IDs
-
- SV-18962r1_rule
Checks: C-19025r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Prevent publishing to a DAV server” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\PubCal\ Criteria: If the value DisableDav is REG_DWORD = 1, this is not a finding.
Fix: F-17661r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Prevent publishing to a DAV server” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO216 - Outlook
- Vuln IDs
-
- V-17763
- Rule IDs
-
- SV-18964r1_rule
Checks: C-19026r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Prevent publishing to Office Online” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\PubCal Criteria: If the value DisableOfficeOnline is REG_DWORD = 1, this is not a finding.
Fix: F-17662r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Prevent publishing to Office Online” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO238 - Outlook
- Vuln IDs
-
- V-17766
- Rule IDs
-
- SV-18970r1_rule
Checks: C-19029r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Prevent users from customizing attachment security” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-17665r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security “Prevent users from customizing attachment security” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO214 - Outlook
- Vuln IDs
-
- V-17770
- Rule IDs
-
- SV-18978r1_rule
Checks: C-19033r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> E-mail Options “Read e-mail as plain text” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value ReadAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-17669r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> E-mail Options “Read e-mail as plain text” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO215 - Outlook
- Vuln IDs
-
- V-17771
- Rule IDs
-
- SV-18980r1_rule
Checks: C-19034r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> E-mail Options “Read signed e-mail as plain text” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value ReadSignedAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-17670r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> E-mail Options “Read signed e-mail as plain text” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO244 - Outlook
- Vuln IDs
-
- V-17774
- Rule IDs
-
- SV-18985r1_rule
Checks: C-19037r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 1” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security\FileExtensionsRemoveLevel1 If registry key exist, this is a finding.
Fix: F-17673r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 1” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO245 - Outlook
- Vuln IDs
-
- V-17775
- Rule IDs
-
- SV-18988r1_rule
Checks: C-19038r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 2” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security\FileExtensionsRemoveLevel2 If registry key exist, this is a finding.
Fix: F-17674r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 2” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO218 - Outlook
- Vuln IDs
-
- V-17776
- Rule IDs
-
- SV-18990r1_rule
Checks: C-19039r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Restrict level of calendar details users can publish” will be set to “Enabled (Disables ‘Full details’ and ‘Limited details’)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\PubCal Criteria: If the value PublishCalendarDetailsPolicy is REG_DWORD = 4000 (hex) or 16384 (Decimal), this is not a finding.
Fix: F-17675r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Restrict level of calendar details users can publish” will be set to “Enabled (Disables ‘Full details’ and ‘Limited details’)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO220 - Outlook
- Vuln IDs
-
- V-17777
- Rule IDs
-
- SV-18992r1_rule
Checks: C-19040r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Restrict upload method” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\PubCal Criteria: If the value SingleUploadOnly is REG_DWORD = 1, this is not a finding.
Fix: F-17676r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Calendar Options -> Microsoft Office Online Sharing Service “Restrict upload method” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO267 - Outlook
- Vuln IDs
-
- V-17778
- Rule IDs
-
- SV-18995r1_rule
Checks: C-19253r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography -> Signature Status dialog box “Retrieving CRLs (Certificate Revocation Lists)” will be set to “Enabled (When online always retrieve the CRL)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value UseCRLChasing is REG_DWORD = 1, this is not a finding.
Fix: F-17753r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography -> Signature Status dialog box “Retrieving CRLs (Certificate Revocation Lists)” will be set to “Enabled (When online always retrieve the CRL)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO262 - Outlook
- Vuln IDs
-
- V-17787
- Rule IDs
-
- SV-19005r1_rule
Checks: C-19041r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Run in FIPS compliant mode” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value FIPSMode is REG_DWORD = 1, this is not a finding.
Fix: F-17687r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Run in FIPS compliant mode” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO257 - Outlook
- Vuln IDs
-
- V-17790
- Rule IDs
-
- SV-19010r1_rule
Checks: C-19043r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME interoperability with external clients” will be set to “Enabled (Handle internally)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value ExternalSMime is REG_DWORD = 0, this is not a finding.
Fix: F-17689r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME interoperability with external clients” will be set to “Enabled (Handle internally)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO258 - Outlook
- Vuln IDs
-
- V-17791
- Rule IDs
-
- SV-19012r1_rule
Checks: C-19044r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME password settings” will be set to “Enabled” and Default S/MIME password time will be set to 30. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Cryptography\Defaults\Provider\ Microsoft Exchange Cryptographic Provider v1.0 Criteria: If the value DefPwdTime is REG_DWORD = 1e (hex) or 30 (decimal), this is not a finding.
Fix: F-17691r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME password settings” will be set to “Enabled” and Default S/MIME password time will be set to 30.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO259 - Office
- Vuln IDs
-
- V-17792
- Rule IDs
-
- SV-19014r1_rule
Checks: C-19045r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME password settings” will be set to “Enabled” and Maximum S/MIME password time will be set to 300. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Cryptography\Defaults\Provider\ Microsoft Exchange Cryptographic Provider v1.0 Criteria: If the value MaxPwdTime is REG_DWORD = 12c (hex) or 300 (decimal), this is not a finding.
Fix: F-17692r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME password settings” will be set to “Enabled” and Maximum S/MIME password time will be set to 300.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO266 - Outlook
- Vuln IDs
-
- V-17795
- Rule IDs
-
- SV-19018r1_rule
Checks: C-19046r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME receipt requests” will be set to “Enabled (Never send S\MIME receipts)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value RespondToReceiptRequests is REG_DWORD = 2, this is not a finding.
Fix: F-17694r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “S/MIME receipt requests” will be set to “Enabled (Never send S\MIME receipts)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO276 - Outlook
- Vuln IDs
-
- V-17798
- Rule IDs
-
- SV-19023r1_rule
Checks: C-19051r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Trust Center “Security setting for macros” will be set to “Enabled (Always warn)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value Level is REG_DWORD = 2, this is not a finding.
Fix: F-17697r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Trust Center “Security setting for macros” will be set to “Enabled (Always warn)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO264 - Outlook
- Vuln IDs
-
- V-17800
- Rule IDs
-
- SV-19026r1_rule
Checks: C-19052r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Send all signed messages as clear signed messages” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value ClearSign is REG_DWORD = 1, this is not a finding.
Fix: F-17699r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Send all signed messages as clear signed messages” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO248 - Base
- Vuln IDs
-
- V-17801
- Rule IDs
-
- SV-19028r1_rule
Checks: C-19053r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Custom Form Security “Set control ItemProperty prompt” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMItemPropertyAccess is REG_DWORD = 0, this is not a finding.
Fix: F-17702r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Custom Form Security “Set control ItemProperty prompt” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO247 - Outlook
- Vuln IDs
-
- V-17802
- Rule IDs
-
- SV-19030r1_rule
Checks: C-19054r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Custom Form Security “Set Outlook object model Custom Actions execution prompt” will be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value PromptOOMCustomAction is REG_DWORD = 0, this is not a finding.
Fix: F-17703r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Custom Form Security “Set Outlook object model Custom Actions execution prompt” will be set to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO265 - Outlook
- Vuln IDs
-
- V-17803
- Rule IDs
-
- SV-19032r1_rule
Checks: C-19058r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Signature Warning” will be set to “Enabled (Always warn about invalid signatures)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security Criteria: If the value WarnAboutInvalid is REG_DWORD = 1, this is not a finding.
Fix: F-17704r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Cryptography “Signature Warning” will be set to “Enabled (Always warn about invalid signatures)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO281 - Outlook
- Vuln IDs
-
- V-17806
- Rule IDs
-
- SV-19038r1_rule
Checks: C-19067r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds “Synchronize Outlook RSS Feeds with Common Feed List” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\RSS Criteria: If the value SyncToSysCFL is REG_DWORD = 0, this is not a finding.
Fix: F-17707r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds “Synchronize Outlook RSS Feeds with Common Feed List” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO223 - Outlook
- Vuln IDs
-
- V-17807
- Rule IDs
-
- SV-19040r1_rule
Checks: C-19068r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Trust E-mail from Contacts” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\Mail Criteria: If the value JunkMailTrustContacts is REG_DWORD = 1, this is not a finding.
Fix: F-17708r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Preferences -> Junk E-mail “Trust E-mail from Contacts” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO282 - Outlook
- Vuln IDs
-
- V-17808
- Rule IDs
-
- SV-19042r1_rule
Checks: C-19069r1_chk
================================== NOTE: Some operational environments may elect to allow use of RSS feeds integrated into Outlook, provided there is a mission need and the network environment meets the following criteria: - both the web site issuing the RSS feeds and the Outlook e-mail client both have an available network path to each other - neither the web site issuing the RSS feeds nor the Outlook e-mail client have a network path to the public Internet. An example of such an environment would be a closed lab or other deployed network where the requisite signoffs, artifacts, and network documentation demonstrate that the Public Internet is not available to the Outlook client, preventing unauthorized RSS subscriptions being accessed by users of the Outlook client. The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds "Turn off RSS feature" will be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\RSS Criteria: If the environment meets the above stated criteria, and value "Disable" is REG_DWORD = 0, this is not a finding. For all environments where the Outlook e-mail client has access to public Internet web sites, RSS integration into Outlook is not permitted, and should be validated as follows. ================================= The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds “Turn off RSS feature” will be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\RSS Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-17709r1_fix
================================== NOTE: If the use of RSS feeds integrated into Outlook is a mission need, and the network environment is configured with the following criteria: 1. Both the web site issuing the RSS feeds and the Outlook e-mail client must both have an available network path to each other. 2. Neither the web site issuing the RSS feeds nor the Outlook e-mail client have a network path to the public Internet. Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds "Turn off RSS feature" to "Disabled". For all environments where the Outlook e-mail clients have access to public Internet web sites, RSS integration into Outlook is not permitted, and should be configured as follows. ================================= The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Account Settings -> RSS Feeds “Turn off RSS feature” will be set to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO231 - Outlook
- Vuln IDs
-
- V-17812
- Rule IDs
-
- SV-19050r1_rule
Checks: C-19094r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Use Unicode format when dragging e-mail message to file” will be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Options\General Criteria: If the value MSGFormat is REG_DWORD = 0, this is not a finding.
Fix: F-17713r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Tools \ Options -> Other -> Advanced “Use Unicode format when dragging e-mail message to file” will be set to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO286 - Outlook
- Vuln IDs
-
- V-17944
- Rule IDs
-
- SV-19435r1_rule
Checks: C-20428r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Meeting Workspace “Disable user entries to server list” will be set to “Enabled (Publish default, disallow others)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\12.0\Meetings\Profile Criteria: If the value ServerUI is REG_DWORD = 2, this is not a finding.
Fix: F-18394r1_fix
The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Meeting Workspace “Disable user entries to server list” will be set to “Enabled (Publish default, disallow others)”.