Microsoft Outlook 2010 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +85 −85
Comparison against the immediately-prior release (V1R11). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 85
- V-242023 Medium Disable user name and password syntax from being used in URLs
- V-242024 Medium Enabling IE Bind to Object functionality must be present.
- V-242025 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-242026 Medium Navigation to URL's embedded in Office products must be blocked.
- V-242027 Medium Scripted Window Security must be enforced.
- V-242028 Medium Add-on Management functionality must be allowed.
- V-242029 Medium Data Execution Prevention must be enforced.
- V-242030 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-242031 Medium File Downloads must be configured for proper restrictions.
- V-242032 Medium Protection from zone elevation must be enforced.
- V-242033 Medium ActiveX Installs must be configured for proper restriction.
- V-242034 Medium Read EMail as plain text must be enforced.
- V-242035 Medium Read signed email as plain text must be enforced.
- V-242036 Medium Publishing calendars to Office Online must be prevented.
- V-242037 Medium Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
- V-242038 Medium Level of calendar details that a user can publish must be restricted.
- V-242039 Medium Access restriction settings for published calendars must be configured.
- V-242040 Medium Upload method for publishing calendars to Office Online must be restricted.
- V-242041 Medium Junk Mail UI must be configured.
- V-242042 Medium Trust EMail from senders in receiver's contact list must be enforced.
- V-242043 Medium Recipients of sent email must be unable to be added to the safe sender's list.
- V-242044 Medium Outlook Dial-up options to Warn user before allowing switch in dial-up access must be configured.
- V-242045 Medium Dial-up and Hang up Options for Outlook must be configured.
- V-242046 Medium Digital signatures must be allowed.
- V-242047 Medium Plain Text Options for outbound email must be configured.
- V-242048 Medium Outlook must be enforced as the default email, calendar, and contacts program.
- V-242049 Medium Folders in non-default stores, set as folder home pages, must be disallowed.
- V-242050 Medium Dragging Unicode eMail messages to file system must be disallowed.
- V-242051 Medium Outlook Object Model scripts must be disallowed to run for shared folders.
- V-242052 Medium Outlook Object Model scripts must be disallowed to run for public folders.
- V-242053 Medium Active X One-Off forms must be configured.
- V-242054 Medium The Add-In Trust Level must be configured.
- V-242055 Medium The "remember password" for internet e-mail accounts must be disabled.
- V-242056 Medium Users customizing attachment security settings must be prevented.
- V-242057 Medium Outlook Security Mode must be configured to use Group Policy settings.
- V-242058 Medium The ability to display level 1 attachments must be disallowed.
- V-242059 Medium Action to demote an EMail Level 1 attachment to Level 2 must be configured.
- V-242060 Medium Prompting behavior for Level 1 attachments on sending must be configured.
- V-242061 Medium Level 1 attachment close behaviors must be configured.
- V-242062 Medium Level 1 file extensions must be blocked and not removed.
- V-242063 Medium Level 2 file extensions must be blocked and not removed.
- V-242064 Medium Scripts in One-Off Outlook forms must be disallowed.
- V-242065 Medium Custom Outlook Object Model (OOM) action execution prompts must be configured.
- V-242066 Medium Object Model Prompt for programmatic email send behavior must be configured.
- V-242067 Medium Object Model Prompt behavior for programmatic address books must be configured.
- V-242068 Medium Object Model Prompt behavior for programmatic access of user address data must be configured.
- V-242069 Medium Object Model Prompt behavior for Meeting and Task Responses must be configured.
- V-242070 Medium Object Model Prompt behavior for the SaveAs method must be configured.
- V-242071 Medium Object Model Prompt behavior for accessing User Property Formula must be configured.
- V-242072 Medium Trusted add-ins behavior for eMail must be configured.
- V-242073 Medium S/Mime interoperability with external clients for message handling must be configured.
- V-242074 Medium Message formats must be set to use SMime.
- V-242075 Medium Run in FIPS compliant mode must be enforced.
- V-242076 Medium All signed messages as clear signed messages must be configured.
- V-242077 Medium Warning about invalid signatures must be enforced.
- V-242078 Medium Automatic sending s/Mime receipt requests must be disallowed.
- V-242079 Medium Retrieving of CRL data must be set for online action.
- V-242080 Medium Missing Root Certificates warning must be enforced.
- V-242081 Medium Attachments using generated name for secure temporary folders must be configured.
- V-242082 Medium External content and pictures in HTML eMail must be displayed.
- V-242083 Medium Automatic download content for email in Safe Senders list must be disallowed.
- V-242084 Medium Permit download of content from safe zones must be configured.
- V-242085 Medium IE Trusted Zones assumed 'trusted' must be blocked.
- V-242086 Medium Internet with Safe Zones for Picture Download must be disabled.
- V-242087 Medium Intranet with Safe Zones for automatic picture downloads must be configured.
- V-242088 Medium Always warn on untrusted macros must be enforced.
- V-242089 Medium Hyperlinks in suspected phishing e-mail messages must be disallowed.
- V-242090 Medium Automatically configure user profile based on Active Directory primary SMTP address must be enforced.
- V-242091 Medium RPC encryption between Outlook and Exchange server must be enforced.
- V-242092 Medium Authentication with Exchange Server must be required.
- V-242093 Medium RSS feed synchronization with Common Feed List must be disallowed.
- V-242094 Medium RSS Feeds must be disallowed.
- V-242095 Medium Disabling download full text of articles as HTML must be configured.
- V-242096 Medium Automatic download of Internet Calendar appointment attachments must be disallowed.
- V-242097 Medium Do not include Internet Calendar Integration in Outlook must be enforced.
- V-242098 Medium User Entries to Server List must be disallowed.
- V-242099 Medium Automatically downloading enclosures on RSS must be disallowed.
- V-242100 Medium Default message format must be set to use Plain Text.
- V-242101 Medium Outlook must be configured not to prompt users to choose security settings if default settings fail.
- V-242102 Medium Outlook minimum encryption key length settings must be set.
- V-242103 Medium Replies or forwards to signed/encrypted messages must be signed/encrypted.
- V-242104 Medium Check e-mail addresses against addresses of certificates being used must be disallowed.
- V-242105 Medium Outlook Rich Text options must be set for converting to plain text format.
- V-242106 Medium Text in Outlook that represents Internet and network paths must not be automatically turned into hyperlinks.
- V-270894 High The version of Outlook running on the system must be a supported version.
Removed rules 85
- V-17173 Medium Disable user name and password syntax from being used in URLs
- V-17174 Medium Enabling IE Bind to Object functionality must be present.
- V-17175 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-17183 Medium Navigation to URL's embedded in Office products must be blocked.
- V-17184 Medium Links that invoke instances of IE from within an Office product must be blocked.
- V-17470 Medium Permit download of content from safe zones must be configured.
- V-17546 Medium Access restriction settings for published calendars must be configured.
- V-17558 Medium Recipients of sent email must be unable to be added to the safe sender's list.
- V-17559 Medium Active X One-Off forms must be configured.
- V-17562 Medium Scripts in One-Off Outlook forms must be disallowed.
- V-17564 Medium IE Trusted Zones assumed 'trusted' must be blocked.
- V-17566 Medium The Add-In Trust Level must be configured.
- V-17568 Medium Object Model Prompt behavior for programmatic address books must be configured.
- V-17569 Medium Action to demote an EMail Level 1 attachment to Level 2 must be configured.
- V-17570 Medium Object Model Prompt behavior for accessing User Property Formula must be configured.
- V-17571 Medium Object Model Prompt behavior for the SaveAs method must be configured.
- V-17572 Medium Object Model Prompt behavior for programmatic access of user address data must be configured.
- V-17573 Medium Object Model Prompt behavior for Meeting and Task Responses must be configured.
- V-17574 Medium Object Model Prompt for programmatic email send behavior must be configured.
- V-17575 Medium Trusted add-ins behavior for eMail must be configured.
- V-17585 Medium Dial-up and Hang up Options for Outlook must be configured.
- V-17586 Medium Outlook Dial-up options to Warn user before allowing switch in dial-up access must be configured.
- V-17587 Medium The "remember password" for internet e-mail accounts must be disabled.
- V-17601 Medium Level 1 attachment close behaviors must be configured.
- V-17602 Medium Prompting behavior for Level 1 attachments on sending must be configured.
- V-17610 Medium Disabling download full text of articles as HTML must be configured.
- V-17613 Medium Hyperlinks in suspected phishing e-mail messages must be disallowed.
- V-17615 Medium RPC encryption between Outlook and Exchange server must be enforced.
- V-17624 Medium Junk Mail UI must be configured.
- V-17630 Medium Internet with Safe Zones for Picture Download must be disabled.
- V-17634 Medium Intranet with Safe Zones for automatic picture downloads must be configured.
- V-17671 Medium The ability to display level 1 attachments must be disallowed.
- V-17672 Medium External content and pictures in HTML eMail must be displayed.
- V-17673 Medium Digital signatures must be allowed.
- V-17674 Medium Folders in non-default stores, set as folder home pages, must be disallowed.
- V-17675 Medium Outlook Object Model scripts must be disallowed to run for public folders.
- V-17676 Medium Outlook Object Model scripts must be disallowed to run for shared folders.
- V-17678 Medium Do not include Internet Calendar Integration in Outlook must be enforced.
- V-17733 Medium Attachments using generated name for secure temporary folders must be configured.
- V-17734 Medium Authentication with Exchange Server must be required.
- V-17736 Medium Automatically configure user profile based on Active Directory primary SMTP address must be enforced.
- V-17738 Medium Automatic download of Internet Calendar appointment attachments must be disallowed.
- V-17739 Medium Automatic download content for email in Safe Senders list must be disallowed.
- V-17753 Medium Outlook must be enforced as the default email, calendar, and contacts program.
- V-17755 Medium Message formats must be set to use SMime.
- V-17756 Medium Missing Root Certificates warning must be enforced.
- V-17760 Medium Outlook Security Mode must be configured to use Group Policy settings.
- V-17761 Medium Plain Text Options for outbound email must be configured.
- V-17762 Medium Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
- V-17763 Medium Publishing calendars to Office Online must be prevented.
- V-17766 Medium Users customizing attachment security settings must be prevented.
- V-17770 Medium Read EMail as plain text must be enforced.
- V-17771 Medium Read signed email as plain text must be enforced.
- V-17774 Medium Level 1 file extensions must be blocked and not removed.
- V-17775 Medium Level 2 file extensions must be blocked and not removed.
- V-17776 Medium Level of calendar details that a user can publish must be restricted.
- V-17777 Medium Upload method for publishing calendars to Office Online must be restricted.
- V-17778 Medium Retrieving of CRL data must be set for online action.
- V-17787 Medium Run in FIPS compliant mode must be enforced.
- V-17790 Medium S/Mime interoperability with external clients for message handling must be configured.
- V-17795 Medium Automatic sending s/Mime receipt requests must be disallowed.
- V-17798 Medium Always warn on untrusted macros must be enforced.
- V-17800 Medium All signed messages as clear signed messages must be configured.
- V-17802 Medium Custom Outlook Object Model (OOM) action execution prompts must be configured.
- V-17803 Medium Warning about invalid signatures must be enforced.
- V-17806 Medium RSS feed synchronization with Common Feed List must be disallowed.
- V-17807 Medium Trust EMail from senders in receiver's contact list must be enforced.
- V-17808 Medium RSS Feeds must be disallowed.
- V-17812 Medium Dragging Unicode eMail messages to file system must be disallowed.
- V-17944 Medium User Entries to Server List must be disallowed.
- V-26584 Medium Add-on Management functionality must be allowed.
- V-26585 Medium Protection from zone elevation must be enforced.
- V-26586 Medium ActiveX Installs must be configured for proper restriction.
- V-26587 Medium File Downloads must be configured for proper restrictions.
- V-26588 Medium Scripted Window Security must be enforced.
- V-26590 Medium Data Execution Prevention must be enforced.
- V-26625 Medium Disable UI extending from documents and templates must be disallowed.
- V-26632 Medium Automatically downloading enclosures on RSS must be disallowed.
- V-26633 Medium Outlook Rich Text options must be set for converting to plain text format.
- V-26634 Medium Default message format must be set to use Plain Text.
- V-26635 Medium Outlook must be configured not to prompt users to choose security settings if default settings fail.
- V-26636 Medium Outlook minimum encryption key length settings must be set.
- V-26637 Medium Replies or forwards to signed/encrypted messages must be signed/encrypted.
- V-26702 Medium Check e-mail addresses against addresses of certificates being used must be disallowed.
- V-41493 Medium Text in Outlook that represents Internet and network paths must not be automatically turned into hyperlinks.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104 - Outlook
- Vuln IDs
-
- V-242023
- V-17173
- Rule IDs
-
- SV-242023r961092_rule
- SV-75853
Checks: C-45298r709197_chk
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2010 (Machine) >> Security Settings >> IE Security "Disable user name and password" must be "Enabled" and a check in the "outlook.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45256r709198_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2010 (Machine) >> Security Settings >> IE Security "Disable user name and password" to "Enabled" and place a check in the "outlook.exe" check box. Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111 - Outlook
- Vuln IDs
-
- V-242024
- V-17174
- Rule IDs
-
- SV-242024r960921_rule
- SV-33390
Checks: C-45299r709200_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" must be "Enabled" and a check in the "outlook.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45257r709201_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the "outlook.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117 - Outlook
- Vuln IDs
-
- V-242025
- V-17175
- Rule IDs
-
- SV-242025r961092_rule
- SV-33419
Checks: C-45300r709203_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" must be "Enabled" and a check in the "outlook.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45258r709449_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the "outlook.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123 - Outlook
- Vuln IDs
-
- V-242026
- V-17183
- Rule IDs
-
- SV-242026r961092_rule
- SV-33412
Checks: C-45301r709206_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" must be "Enabled" and a check in the "outlook.exe" check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45259r709451_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the "outlook.exe" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124 - Outlook
- Vuln IDs
-
- V-242027
- V-26588
- Rule IDs
-
- SV-242027r960921_rule
- SV-33806
Checks: C-45302r709209_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" must be set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45260r709210_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'outlook.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126 - Outlook
- Vuln IDs
-
- V-242028
- V-26584
- Rule IDs
-
- SV-242028r961086_rule
- SV-33782
Checks: C-45303r709212_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management" must be set to "Enabled" and "outlook.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45261r709463_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Add-on Management " to "Enabled" and "outlook.exe" is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO128 - Outlook
- Vuln IDs
-
- V-242029
- V-26590
- Rule IDs
-
- SV-242029r961092_rule
- SV-33857
Checks: C-45304r709215_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-45262r709216_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129 - Outlook
- Vuln IDs
-
- V-242030
- V-17184
- Rule IDs
-
- SV-242030r961086_rule
- SV-33398
Checks: C-45305r709218_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" must be "Enabled" and "outlook.exe" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45263r709453_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select "outlook.exe".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132 - Outlook
- Vuln IDs
-
- V-242031
- V-26587
- Rule IDs
-
- SV-242031r961089_rule
- SV-33800
Checks: C-45306r709221_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" must be set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45264r709222_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and select 'outlook.exe'.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209 - Outlook
- Vuln IDs
-
- V-242032
- V-26585
- Rule IDs
-
- SV-242032r960921_rule
- SV-33790
Checks: C-45307r709224_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" must be set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45265r709225_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'outlook.exe' is checked.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211 - Outlook
- Vuln IDs
-
- V-242033
- V-26586
- Rule IDs
-
- SV-242033r961779_rule
- SV-33793
Checks: C-45308r709227_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" must be set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-45266r709228_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'outlook.exe' is checked.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO214 - Outlook
- Vuln IDs
-
- V-242034
- V-17770
- Rule IDs
-
- SV-242034r961863_rule
- SV-33518
Checks: C-45309r709230_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options "Read e-mail as plain text" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value ReadAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-45267r709231_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options "Read e-mail as plain text" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO215 - Outlook
- Vuln IDs
-
- V-242035
- V-17771
- Rule IDs
-
- SV-242035r961863_rule
- SV-33519
Checks: C-45310r709233_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options "Read signed e-mail as plain text" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value ReadSignedAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-45268r709234_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options "Read signed e-mail as plain text" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO216 - Outlook
- Vuln IDs
-
- V-242036
- V-17763
- Rule IDs
-
- SV-242036r961863_rule
- SV-33515
Checks: C-45311r709236_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to Office.com" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value DisableOfficeOnline is REG_DWORD = 1, this is not a finding.
Fix: F-45269r709237_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to Office.com" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO217 - Outlook
- Vuln IDs
-
- V-242037
- V-17762
- Rule IDs
-
- SV-242037r961863_rule
- SV-33514
Checks: C-45312r709239_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to a DAV server" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value DisableDav is REG_DWORD = 1, this is not a finding.
Fix: F-45270r709240_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to a DAV server" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO218 - Outlook
- Vuln IDs
-
- V-242038
- V-17776
- Rule IDs
-
- SV-242038r961863_rule
- SV-33516
Checks: C-45313r709242_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict level of calendar details users can publish" must be "Enabled (Disables "Full details" and "Limited details")". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value PublishCalendarDetailsPolicy is REG_DWORD = 4000 (hex) or 16384 (Decimal), this is not a finding.
Fix: F-45271r709461_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict level of calendar details users can publish" to "Enabled (Disables 'Full details' and 'Limited details')".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO219 - Outlook
- Vuln IDs
-
- V-242039
- V-17546
- Rule IDs
-
- SV-242039r961863_rule
- SV-33513
Checks: C-45314r709245_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Access to published calendars" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value RestrictedAccessOnly is REG_DWORD = 1, this is not a finding.
Fix: F-45272r709246_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Access to published calendars" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO220 - Outlook
- Vuln IDs
-
- V-242040
- V-17777
- Rule IDs
-
- SV-242040r961863_rule
- SV-33517
Checks: C-45315r709248_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict upload method" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value SingleUploadOnly is REG_DWORD = 1, this is not a finding.
Fix: F-45273r709249_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict upload method" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO221 - Outlook
- Vuln IDs
-
- V-242041
- V-17624
- Rule IDs
-
- SV-242041r961863_rule
- SV-33521
Checks: C-45316r709251_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail "Hide Junk Mail UI" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook Criteria: If the value DisableAntiSpam is REG_DWORD = 0, this is not a finding.
Fix: F-45274r709252_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail "Hide Junk Mail UI" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO223 - Outlook
- Vuln IDs
-
- V-242042
- V-17807
- Rule IDs
-
- SV-242042r961863_rule
- SV-33522
Checks: C-45317r709254_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail "Trust E-mail from Contacts" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value JunkMailTrustContacts is REG_DWORD = 1, this is not a finding.
Fix: F-45275r709255_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail "Trust E-mail from Contacts" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO224 - Outlook
- Vuln IDs
-
- V-242043
- V-17558
- Rule IDs
-
- SV-242043r961863_rule
- SV-33520
Checks: C-45318r709257_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail "Add e-mail recipients to users' Safe Senders Lists" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value JunkMailTrustOutgoingRecipients is REG_DWORD = 0, this is not a finding.
Fix: F-45276r709258_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail "Add e-mail recipients to users' Safe Senders Lists" to "Disabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- DTOO225 - Outlook
- Vuln IDs
-
- V-242044
- V-17586
- Rule IDs
-
- SV-242044r961503_rule
- SV-33507
Checks: C-45319r849884_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup "Dial-up options" must be set to "Enabled" and Warn before switching dial-up connection is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Warn on Dialup is REG_DWORD = 1, this is not a finding.
Fix: F-45277r709456_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup "Dial-up options" to "Enabled" and Warn before switching dial-up connection is selected.
- RMF Control
- SC-15
- Severity
- M
- CCI
- CCI-001150
- Version
- DTOO226 - Outlook
- Vuln IDs
-
- V-242045
- V-17585
- Rule IDs
-
- SV-242045r961074_rule
- SV-33506
Checks: C-45320r709471_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup "Dial-up options" must be set to "Enabled" and Hang up when finished sending, receiving, or updating is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Hangup after Spool is REG_DWORD = 1, this is not a finding.
Fix: F-45278r709472_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup "Dial-up options" to "Enabled" and Hang up when finished sending, receiving, or updating is selected.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- DTOO227 - Outlook
- Vuln IDs
-
- V-242046
- V-17673
- Rule IDs
-
- SV-242046r961857_rule
- SV-33504
Checks: C-45321r709266_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010-> Outlook Options -> Mail format "Do not allow signatures for e-mail messages" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\mailsettings Criteria: If the value DisableSignatures is REG_DWORD = 0, this is not a finding.
Fix: F-45279r709267_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010-> Outlook Options -> Mail format "Do not allow signatures for e-mail messages" to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- DTOO228 - Outlook
- Vuln IDs
-
- V-242047
- V-17761
- Rule IDs
-
- SV-242047r961632_rule
- SV-33505
Checks: C-45322r709269_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail format -> Internet Formatting "Plain text options" must be set to "Enabled" where line length is "132" and that NO Check is visible in the "Encode all attachments in UUENCODE format when sending a plain text message" checkbox option. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\mailsettings Criteria: If the value PlainWrapLen is REG_DWORD = 132 (decimal), this is not a finding. AND HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Message Plain Format Mime is REG_DWORD = 1, this is not a finding.
Fix: F-45280r709270_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail format -> Internet Formatting "Plain text -> options" to "Enabled" where line length is "132" and that NO Check is visible in the "Encode all attachments in UUENCODE format when sending a plain text message" checkbox option.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO229 - Outlook
- Vuln IDs
-
- V-242048
- V-17753
- Rule IDs
-
- SV-242048r961863_rule
- SV-33508
Checks: C-45323r709272_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other "Make Outlook the default program for E-mail, Contacts, and Calendar" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\general Criteria: If the value Check Default Client is REG_DWORD = 1, this is not a finding.
Fix: F-45281r709273_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other "Make Outlook the default program for E-mail, Contacts, and Calendar" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO230 - Outlook
- Vuln IDs
-
- V-242049
- V-17674
- Rule IDs
-
- SV-242049r960963_rule
- SV-33509
Checks: C-45324r709275_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Do not allow folders in non-default stores to be set as folder home pages" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value NonDefaultStoreScript is REG_DWORD = 0, this is not a finding.
Fix: F-45282r709276_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Do not allow folders in non-default stores to be set as folder home pages" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO231 - Outlook
- Vuln IDs
-
- V-242050
- V-17812
- Rule IDs
-
- SV-242050r960963_rule
- SV-33512
Checks: C-45325r709278_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Use Unicode format when dragging e-mail message to file system" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\general Criteria: If the value MSGFormat is REG_DWORD = 0, this is not a finding.
Fix: F-45283r709279_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Use Unicode format when dragging e-mail message to file system" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO232 - Outlook
- Vuln IDs
-
- V-242051
- V-17676
- Rule IDs
-
- SV-242051r961092_rule
- SV-33511
Checks: C-45326r709281_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for shared folders" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value SharedFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-45284r709282_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for shared folders" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO233 - Outlook
- Vuln IDs
-
- V-242052
- V-17675
- Rule IDs
-
- SV-242052r961092_rule
- SV-33510
Checks: C-45327r709284_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for public folders" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PublicFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-45285r709285_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for public folders" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO234 - Outlook
- Vuln IDs
-
- V-242053
- V-17559
- Rule IDs
-
- SV-242053r961092_rule
- SV-33523
Checks: C-45328r709287_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Allow Active X One Off Forms" must be set to "Enabled: Load only Outlook Controls". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AllowActiveXOneOffForms is REG_DWORD = 0, this is not a finding.
Fix: F-45286r709288_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Allow Active X One Off Forms" to "Enabled: Load only Outlook Controls".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO236 - Outlook
- Vuln IDs
-
- V-242054
- V-17566
- Rule IDs
-
- SV-242054r961092_rule
- SV-33932
Checks: C-45329r709290_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Configure Add-In Trust Level" must be set to "Enabled (Trust all loaded and installed COM addins)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AddinTrust is REG_DWORD = 1, this is not a finding.
Fix: F-45287r709291_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Configure Add-In Trust Level" to "Enabled (Trust all loaded and installed COM addins)".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- DTOO237 - Outlook
- Vuln IDs
-
- V-242055
- V-17587
- Rule IDs
-
- SV-242055r961521_rule
- SV-33524
Checks: C-45330r709293_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Disable "Remember password" for Internet e-mail accounts" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableRememberPwd is REG_DWORD = 0, this is not a finding.
Fix: F-45288r709458_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Disable 'Remember password' for Internet e-mail accounts" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO238 - Outlook
- Vuln IDs
-
- V-242056
- V-17766
- Rule IDs
-
- SV-242056r961092_rule
- SV-33525
Checks: C-45331r709296_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Prevent users from customizing attachment security settings" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-45289r709297_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Prevent users from customizing attachment security settings" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO239 - Outlook
- Vuln IDs
-
- V-242057
- V-17760
- Rule IDs
-
- SV-242057r961863_rule
- SV-33577
Checks: C-45332r709299_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings "Outlook Security Mode" must be "Enabled (Use Outlook Security Group Policy)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AdminSecurityMode is REG_DWORD = 3, this is not a finding.
Fix: F-45290r709300_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings "Outlook Security Mode" to "Enabled (Use Outlook Security Group Policy)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO240 - Outlook
- Vuln IDs
-
- V-242058
- V-17671
- Rule IDs
-
- SV-242058r961086_rule
- SV-33580
Checks: C-45333r709302_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Display Level 1 attachments" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-45291r709303_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Display Level 1 attachments" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO241 - Outlook
- Vuln IDs
-
- V-242059
- V-17569
- Rule IDs
-
- SV-242059r961086_rule
- SV-33578
Checks: C-45334r709305_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Allow users to demote attachments to Level 2" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AllowUsersToLowerAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-45292r709306_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Allow users to demote attachments to Level 2" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO242 - Outlook
- Vuln IDs
-
- V-242060
- V-17602
- Rule IDs
-
- SV-242060r961086_rule
- SV-33582
Checks: C-45335r709308_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when sending an item" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value DontPromptLevel1AttachSend is REG_DWORD = 0, this is not a finding.
Fix: F-45293r709309_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when sending an item" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO243 - Outlook
- Vuln IDs
-
- V-242061
- V-17601
- Rule IDs
-
- SV-242061r961086_rule
- SV-33581
Checks: C-45336r709311_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when closing an item" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value DontPromptLevel1AttachClose is REG_DWORD = 0, this is not a finding.
Fix: F-45294r709312_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when closing an item" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO244 - Outlook
- Vuln IDs
-
- V-242062
- V-17774
- Rule IDs
-
- SV-242062r961086_rule
- SV-33583
Checks: C-45337r709314_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 1" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security\FileExtensionsRemoveLevel1 Criteria: If registry key exist, this is a finding.
Fix: F-45295r709315_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 1" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO245 - Outlook
- Vuln IDs
-
- V-242063
- V-17775
- Rule IDs
-
- SV-242063r961086_rule
- SV-33585
Checks: C-45338r709317_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 2" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security\FileExtensionsRemoveLevel2 Criteria: If registry key exist, this is a finding.
Fix: F-45296r709318_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 2" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO246 - Outlook
- Vuln IDs
-
- V-242064
- V-17562
- Rule IDs
-
- SV-242064r961092_rule
- SV-33586
Checks: C-45339r709320_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security "Allow scripts in one-off Outlook forms" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix: F-45297r709321_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security "Allow scripts in one-off Outlook forms" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO247 - Outlook
- Vuln IDs
-
- V-242065
- V-17802
- Rule IDs
-
- SV-242065r961779_rule
- SV-33587
Checks: C-45340r709323_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security "Set Outlook object model Custom Actions execution prompt" must be "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMCustomAction is REG_DWORD = 0, this is not a finding.
Fix: F-45298r709324_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security "Set Outlook object model Custom Actions execution prompt" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO249 - Outlook
- Vuln IDs
-
- V-242066
- V-17574
- Rule IDs
-
- SV-242066r961779_rule
- SV-33595
Checks: C-45341r709326_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when sending mail" must be set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMSend is REG_DWORD = 0, this is not a finding.
Fix: F-45299r709327_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when sending mail" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO250 - Outlook
- Vuln IDs
-
- V-242067
- V-17568
- Rule IDs
-
- SV-242067r961779_rule
- SV-33588
Checks: C-45342r709329_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when accessing an address book" must be set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMAddressBookAccess is REG_DWORD = 0, this is not a finding.
Fix: F-45300r709330_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when accessing an address book" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO251 - Outlook
- Vuln IDs
-
- V-242068
- V-17572
- Rule IDs
-
- SV-242068r961779_rule
- SV-33593
Checks: C-45343r709332_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when reading address information" must be set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMAddressInformationAccess is REG_DWORD = 0, this is not a finding.
Fix: F-45301r709333_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when reading address information" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO252 - Outlook
- Vuln IDs
-
- V-242069
- V-17573
- Rule IDs
-
- SV-242069r961779_rule
- SV-33594
Checks: C-45344r709335_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when responding to meeting and task requests" must be set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMMeetingTaskRequestResponse is REG_DWORD = 0, this is not a finding.
Fix: F-45302r709336_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when responding to meeting and task requests" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO253 - Outlook
- Vuln IDs
-
- V-242070
- V-17571
- Rule IDs
-
- SV-242070r961779_rule
- SV-33592
Checks: C-45345r709338_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when executing Save As" must be set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMSaveAs is REG_DWORD = 0, this is not a finding.
Fix: F-45303r709339_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when executing Save As" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO254 - Outlook
- Vuln IDs
-
- V-242071
- V-17570
- Rule IDs
-
- SV-242071r961779_rule
- SV-33589
Checks: C-45346r709341_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" must be set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-45304r709342_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" to "Enabled (Automatically Deny)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO256 - Outlook
- Vuln IDs
-
- V-242072
- V-17575
- Rule IDs
-
- SV-242072r961863_rule
- SV-33596
Checks: C-45347r709344_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins "Configure trusted add-ins" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\Outlook\security\trustedaddins Criteria: If the registry key exists, this is a finding.
Fix: F-45305r709345_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins "Configure trusted add-ins" to "Disabled".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- DTOO257 - Outlook
- Vuln IDs
-
- V-242073
- V-17790
- Rule IDs
-
- SV-242073r961050_rule
- SV-33566
Checks: C-45348r709347_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "S/MIME interoperability with external clients" must be set to "Enabled (Handle internally)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ExternalSMime is REG_DWORD = 0, this is not a finding.
Fix: F-45306r709348_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "S/MIME interoperability with external clients" to "Enabled (Handle internally)".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- DTOO260 - Outlook
- Vuln IDs
-
- V-242074
- V-17755
- Rule IDs
-
- SV-242074r961050_rule
- SV-33563
Checks: C-45349r709350_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Message Formats" must be set to "Enabled (S\MIME)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value MsgFormats is REG_DWORD = 1, this is not a finding.
Fix: F-45307r709351_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Message Formats" to "Enabled (S\MIME)".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- DTOO262 - Outlook
- Vuln IDs
-
- V-242075
- V-17787
- Rule IDs
-
- SV-242075r961050_rule
- SV-33565
Checks: C-45350r709353_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Run in FIPS compliant mode" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value FIPSMode is REG_DWORD = 1, this is not a finding.
Fix: F-45308r709354_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Run in FIPS compliant mode" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO264 - Outlook
- Vuln IDs
-
- V-242076
- V-17800
- Rule IDs
-
- SV-242076r961863_rule
- SV-33570
Checks: C-45351r709356_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Send all signed messages as clear signed messages" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ClearSign is REG_DWORD = 1, this is not a finding.
Fix: F-45309r709357_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Send all signed messages as clear signed messages" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTOO265 - Outlook
- Vuln IDs
-
- V-242077
- V-17803
- Rule IDs
-
- SV-242077r961893_rule
- SV-33571
Checks: C-45352r709359_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Signature Warning" must be "Enabled (Always warn about invalid signatures)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value WarnAboutInvalid is REG_DWORD = 1, this is not a finding.
Fix: F-45310r709360_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Signature Warning" to "Enabled (Always warn about invalid signatures)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO266 - Outlook
- Vuln IDs
-
- V-242078
- V-17795
- Rule IDs
-
- SV-242078r961863_rule
- SV-33568
Checks: C-45353r709362_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "S/MIME receipt requests behavior" must be "Enabled (Never send S\MIME receipts)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value RespondToReceiptRequests is REG_DWORD = 2, this is not a finding.
Fix: F-45311r709363_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "S/MIME receipt requests behavior" to "Enabled (Never send S\MIME receipts)".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTOO267 - Outlook
- Vuln IDs
-
- V-242079
- V-17778
- Rule IDs
-
- SV-242079r961893_rule
- SV-33880
Checks: C-45354r709365_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" must be "Enabled (When online always retrieve the CRL)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value UseCRLChasing is REG_DWORD = 1, this is not a finding.
Fix: F-45312r709366_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" to "Enabled (When online always retrieve the CRL)".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTOO268 - Outlook
- Vuln IDs
-
- V-242080
- V-17756
- Rule IDs
-
- SV-242080r961893_rule
- SV-33574
Checks: C-45355r709368_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box "Missing root certificates" must be set to "Enabled (Error)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value SigStatusNoTrustDecision is REG_DWORD = 2, this is not a finding.
Fix: F-45313r709369_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box "Missing root certificates" to "Enabled (Error)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO269 - Outlook
- Vuln IDs
-
- V-242081
- V-17733
- Rule IDs
-
- SV-242081r961863_rule
- SV-33572
Checks: C-45356r709371_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box "Attachment Secure Temporary Folder" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security\OutlookSecureTempFolder Criteria: If the registry key exists, this is a finding.
Fix: F-45314r709372_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box "Attachment Secure Temporary Folder" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO270 - Outlook
- Vuln IDs
-
- V-242082
- V-17672
- Rule IDs
-
- SV-242082r961863_rule
- SV-33548
Checks: C-45357r709374_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office Outlook 2010 >> Security >> Automatic Picture Download Settings "Display pictures and external content in HTML e-mail" is set to "Enable". NOTE: When this setting is Enabled, Outlook 2010 blocks automatic download of content from external servers unless the sender is included in the Safe Senders list. Recipients can choose to download external content from untrusted senders on a message-by-message basis. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\Outlook\Options\Mail Criteria: If the value BlockExtContent is REG_DWORD = 0, this is not a finding.
Fix: F-45315r709375_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2010 >> Security >> Automatic Picture Download Settings "Display pictures and external content in HTML e-mail" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO271 - Outlook
- Vuln IDs
-
- V-242083
- V-17739
- Rule IDs
-
- SV-242083r961863_rule
- SV-33529
Checks: C-45358r709377_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value UnblockSpecificSenders is REG_DWORD = 0, this is not a finding.
Fix: F-45316r709378_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO272 - Outlook
- Vuln IDs
-
- V-242084
- V-17470
- Rule IDs
-
- SV-242084r961863_rule
- SV-33558
Checks: C-45359r709380_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Do not permit download of content from safe zones" must be set to "Disabled". This will allow the download of content from safe zone. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value UnblockSafeZone is REG_DWORD = 1, this is not a finding.
Fix: F-45317r709381_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Do not permit download of content from safe zones" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO273 - Outlook
- Vuln IDs
-
- V-242085
- V-17564
- Rule IDs
-
- SV-242085r961863_rule
- SV-33540
Checks: C-45360r709383_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Block Trusted Zones" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value TrustedZone is REG_DWORD = 0, this is not a finding.
Fix: F-45318r709384_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Block Trusted Zones" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO274 - Outlook
- Vuln IDs
-
- V-242086
- V-17630
- Rule IDs
-
- SV-242086r961863_rule
- SV-33561
Checks: C-45361r709386_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Include Internet in Safe Zones for Automatic Picture Download" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-45319r709387_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Include Internet in Safe Zones for Automatic Picture Download" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO275 - Outlook
- Vuln IDs
-
- V-242087
- V-17634
- Rule IDs
-
- SV-242087r961863_rule
- SV-33562
Checks: C-45362r709389_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Include Intranet in Safe Zones for Automatic Picture Download" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-45320r709390_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings "Include Intranet in Safe Zones for Automatic Picture Download" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO276 - Outlook
- Vuln IDs
-
- V-242088
- V-17798
- Rule IDs
-
- SV-242088r961086_rule
- SV-33598
Checks: C-45363r709392_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center "Security setting for macros" must be "Enabled (Always warn)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value Level is REG_DWORD = 2, this is not a finding.
Fix: F-45321r709393_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center "Security setting for macros" to "Enabled (Always warn)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO277 - Outlook
- Vuln IDs
-
- V-242089
- V-17613
- Rule IDs
-
- SV-242089r961863_rule
- SV-33597
Checks: C-45364r709395_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-45322r709396_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO278 - Outlook
- Vuln IDs
-
- V-242090
- V-17736
- Rule IDs
-
- SV-242090r961863_rule
- SV-33487
Checks: C-45365r709398_chk
NOTE: If Outlook 2010 is configured to access DoD Enterprise Email, this check is not applicable. The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange "Automatically configure profile based on Active Directory Primary SMTP address" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\autodiscover Criteria: If the value ZeroConfigExchange is REG_DWORD = 1, this is not a finding.
Fix: F-45323r709399_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange "Automatically configure profile based on Active Directory Primary SMTP address" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- DTOO279 - Outlook
- Vuln IDs
-
- V-242091
- V-17615
- Rule IDs
-
- SV-242091r961506_rule
- SV-33493
Checks: C-45366r709401_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange "Enable RPC encryption" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\rpc Criteria: If the value EnableRPCEncryption is REG_DWORD = 1, this is not a finding.
Fix: F-45324r709402_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange "Enable RPC encryption" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- DTOO280 - Outlook
- Vuln IDs
-
- V-242092
- V-17734
- Rule IDs
-
- SV-242092r961506_rule
- SV-33486
Checks: C-45367r709404_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange "Authentication with Exchange Server" must be set to "Enabled (Kerberos/NTLM Password Authentication)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AuthenticationService is REG_DWORD = 9, this is not a finding.
Fix: F-45325r709405_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange "Authentication with Exchange Server" to "Enabled (Kerberos/NTLM Password Authentication)".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO281 - Outlook
- Vuln IDs
-
- V-242093
- V-17806
- Rule IDs
-
- SV-242093r960963_rule
- SV-33501
Checks: C-45368r709407_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds "Synchronize Outlook RSS Feeds with Common Feed List" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value SyncToSysCFL is REG_DWORD = 0, this is not a finding.
Fix: F-45326r709408_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds "Synchronize Outlook RSS Feeds with Common Feed List" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO282 - Outlook
- Vuln IDs
-
- V-242094
- V-17808
- Rule IDs
-
- SV-242094r960963_rule
- SV-33502
Checks: C-45369r709410_chk
NOTE: Some operational environments may elect to allow use of RSS feeds integrated into Outlook, provided there is a mission need and the network environment meets the following criteria: - both the web site issuing the RSS feeds and the Outlook e-mail client both have an available network path to each other - neither the web site issuing the RSS feeds nor the Outlook e-mail client have a network path to the public Internet. An example of such an environment would be a closed lab or other deployed network where the requisite signoffs, artifacts, and network documentation demonstrate that the Public Internet is not available to the Outlook client, preventing unauthorized RSS subscriptions being accessed by users of the Outlook client. The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” must be set to “Disabled”. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the environment meets the above stated criteria, and value "Disable" is REG_DWORD = 0, this is not a finding. For all environments where the Outlook e-mail client has access to public Internet web sites, RSS integration into Outlook is not permitted, and should be validated as follows. END NOTE: The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-45327r709411_fix
NOTE: If the use of RSS feeds integrated into Outlook is a mission need, and the network environment is configured with the following criteria: 1. Both the web site issuing the RSS feeds and the Outlook e-mail client must both have an available network path to each other. 2. Neither the web site issuing the RSS feeds nor the Outlook e-mail client have a network path to the public Internet. Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” to “Disabled”. For all environments where the Outlook e-mail clients have access to public Internet web sites, RSS integration into Outlook is not permitted, and should be configured as follows. END NOTE: Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO283 - Outlook
- Vuln IDs
-
- V-242095
- V-17610
- Rule IDs
-
- SV-242095r961863_rule
- SV-33500
Checks: C-45370r709413_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds "Download full text of articles as HTML attachments" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value EnableFullTextHTML is REG_DWORD = 0, this is not a finding.
Fix: F-45328r709414_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds "Download full text of articles as HTML attachments" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO284 - Outlook
- Vuln IDs
-
- V-242096
- V-17738
- Rule IDs
-
- SV-242096r961089_rule
- SV-33496
Checks: C-45371r709416_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars "Automatically download attachments" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\webcal Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-45329r709417_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars "Automatically download attachments" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO285 - Outlook
- Vuln IDs
-
- V-242097
- V-17678
- Rule IDs
-
- SV-242097r960963_rule
- SV-33499
Checks: C-45372r709419_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars "Do not include Internet Calendar integration in Outlook" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\webcal Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-45330r709420_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars "Do not include Internet Calendar integration in Outlook" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO286 - Outlook
- Vuln IDs
-
- V-242098
- V-17944
- Rule IDs
-
- SV-242098r960963_rule
- SV-33503
Checks: C-45373r709422_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Meeting Workspace "Disable user entries to server list" must be set to "Enabled (Publish default, disallow others)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\meetings\profile Criteria: If the value ServerUI is REG_DWORD = 2, this is not a finding.
Fix: F-45331r709423_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Meeting Workspace "Disable user entries to server list" to "Enabled (Publish default, disallow others)".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO313 - Outlook
- Vuln IDs
-
- V-242099
- V-26632
- Rule IDs
-
- SV-242099r960963_rule
- SV-34101
Checks: C-45374r709425_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds "Automatically download enclosures" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-45332r709426_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds "Automatically download enclosures" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO314 - Outlook
- Vuln IDs
-
- V-242100
- V-26634
- Rule IDs
-
- SV-242100r961863_rule
- SV-34105
Checks: C-45375r709428_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting -> Message Format "Set message format" must be "Enabled: Plain Text". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value EditorPreference is REG_DWORD = 65536 (dec), this is not a finding.
Fix: F-45333r709429_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting -> Message Format "Set message format" to "Enabled: Plain Text".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO315 - Outlook
- Vuln IDs
-
- V-242101
- V-26635
- Rule IDs
-
- SV-242101r961863_rule
- SV-34106
Checks: C-45376r709431_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Prompt user to choose security settings if default settings fail" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ForceDefaultProfile is REG_DWORD = 0, this is not a finding.
Fix: F-45334r709432_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security "Prompt user to choose security settings if default settings fail" to "Disabled".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- DTOO316 - Outlook
- Vuln IDs
-
- V-242102
- V-26636
- Rule IDs
-
- SV-242102r961857_rule
- SV-34107
Checks: C-45377r709434_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography "Minimum encryption settings" must be set to "Enabled: 168 bits". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value MinEncKey is REG_DWORD = 168, this is not a finding.
Fix: F-45335r709435_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography "Minimum encryption settings" to "Enabled: 168 bits".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO317 - Outlook
- Vuln IDs
-
- V-242103
- V-26637
- Rule IDs
-
- SV-242103r961863_rule
- SV-34109
Checks: C-45378r709437_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography "Replies or forwards to signed/encrypted messages are signed/encrypted" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value NoCheckOnSessionSecurity is REG_DWORD = 1, this is not a finding.
Fix: F-45336r709438_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography "Replies or forwards to signed/encrypted messages are signed/encrypted" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO320 - Outlook
- Vuln IDs
-
- V-242104
- V-26702
- Rule IDs
-
- SV-242104r961863_rule
- SV-34110
Checks: C-45379r709440_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Do not check e-mail address against address of certificates being used" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value SupressNameChecks is REG_DWORD = 1, this is not a finding.
Fix: F-45337r709441_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography "Do not check e-mail address against address of certificates being used" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO344 - Outlook
- Vuln IDs
-
- V-242105
- V-26633
- Rule IDs
-
- SV-242105r961863_rule
- SV-34103
Checks: C-45380r709443_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting "Outlook Rich Text options" must be "Enabled: Convert to Plain Text format". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Message RTF Format is REG_DWORD = 1, this is not a finding.
Fix: F-45338r709444_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting "Outlook Rich Text options" to "Enabled: Convert to Plain Text format".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO425 - Outlook
- Vuln IDs
-
- V-242106
- V-41493
- Rule IDs
-
- SV-242106r961863_rule
- SV-55984
Checks: C-45381r709446_chk
The intent of this check is to block the display of Internet and network paths as hyperlinks in email messages. This requirement cannot be configured in the Office 2010 Administrative Templates. It can either be configured individually, within each Outlook client, or by registry key. To verify within the Outlook client that "Internet and network path into hyperlinks" is not enabled: From the main Outlook window, go to Tools>>Options. Select the "Mail Format" tab. Select the "Editor Options" button. In the left pane, select the "Proofing" button. Select the "AutoCorrect" button. Select the "AutoFormat As You Type" tab. Criteria: If the "Internet and network path into hyperlinks" checkbox is selected, this is a finding. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\14.0\outlook\options\autoformat Criteria: If the value pgrfafo_25_1 is REG_DWORD = 1, this is a finding.
Fix: F-45339r709447_fix
Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\14.0\outlook\options\autoformat If the REG_DWORD value for pgrfafo_25_1 does not exist, create it with a value of "0". If the REG_DWORD value for pgrfafo_25_1 does exist, change the value to "0".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- DTOO425 - Outlook
- Vuln IDs
-
- V-270894
- Rule IDs
-
- SV-270894r1055863_rule
Checks: C-74935r1055861_chk
Outlook 2010 is no longer supported by the vendor. If the system is running Outlook 2010, this is a finding.
Fix: F-74836r1055862_fix
Upgrade to a supported version.