Microsoft Outlook 2010
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - Outlook
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-33390r1_rule
Checks: C-33873r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” must be “Enabled” and a check in the ‘outlook.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29562r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” to “Enabled” and place a check in the ‘outlook.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - Outlook
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-33419r1_rule
Checks: C-33903r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” must be “Enabled” and a check in the ‘outlook.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29591r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” to “Enabled” and place a check in the ‘outlook.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - Outlook
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-33412r1_rule
Checks: C-33895r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” must be “Enabled” and a check in the ‘outlook.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29584r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” to “Enabled” and place a check in the ‘outlook.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - Outlook
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-33398r1_rule
Checks: C-33881r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” must be “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29570r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” to “Enabled” and select ‘outlook.exe’.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO272 - Outlook
- Vuln IDs
-
- V-17470
- Rule IDs
-
- SV-33558r2_rule
Checks: C-34016r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Do not permit download of content from safe zones” must be set to “Disabled”. This will allow the download of content from safe zone. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value UnblockSafeZone is REG_DWORD = 1, this is not a finding.
Fix: F-29704r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Do not permit download of content from safe zones” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO219 - Outlook
- Vuln IDs
-
- V-17546
- Rule IDs
-
- SV-33513r1_rule
Checks: C-34000r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Access to published calendars” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value RestrictedAccessOnly is REG_DWORD = 1, this is not a finding.
Fix: F-29688r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Access to published calendars” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO224 - Outlook
- Vuln IDs
-
- V-17558
- Rule IDs
-
- SV-33520r1_rule
Checks: C-34007r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail “Add e-mail recipients to users' Safe Senders Lists” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value JunkMailTrustOutgoingRecipients is REG_DWORD = 0, this is not a finding.
Fix: F-29695r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail “Add e-mail recipients to users' Safe Senders Lists” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO234 - Outlook
- Vuln IDs
-
- V-17559
- Rule IDs
-
- SV-33523r1_rule
Checks: C-34010r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Allow Active X One Off Forms” must be set to “Enabled: Load only Outlook Controls”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AllowActiveXOneOffForms is REG_DWORD = 0, this is not a finding.
Fix: F-29698r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Allow Active X One Off Forms” to “Enabled: Load only Outlook Controls”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO246 - Outlook
- Vuln IDs
-
- V-17562
- Rule IDs
-
- SV-33586r1_rule
Checks: C-34046r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security “Allow scripts in one-off Outlook forms” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix: F-29729r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security “Allow scripts in one-off Outlook forms” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO273 - Outlook
- Vuln IDs
-
- V-17564
- Rule IDs
-
- SV-33540r1_rule
Checks: C-34014r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Block Trusted Zones” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value TrustedZone is REG_DWORD = 0, this is not a finding.
Fix: F-29702r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Block Trusted Zones” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO236 - Outlook
- Vuln IDs
-
- V-17566
- Rule IDs
-
- SV-33932r1_rule
Checks: C-34374r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Configure Add-In Trust Level” must be set to “Enabled (Trust all loaded and installed COM addins)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AddinTrust is REG_DWORD = 1, this is not a finding.
Fix: F-30010r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Configure Add-In Trust Level” to “Enabled (Trust all loaded and installed COM addins)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO250 - Outlook
- Vuln IDs
-
- V-17568
- Rule IDs
-
- SV-33588r1_rule
Checks: C-34050r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when accessing an address book” must be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMAddressBookAccess is REG_DWORD = 0, this is not a finding.
Fix: F-29732r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when accessing an address book” to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO241 - Outlook
- Vuln IDs
-
- V-17569
- Rule IDs
-
- SV-33578r1_rule
Checks: C-34039r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Allow users to demote attachments to Level 2” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AllowUsersToLowerAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-29723r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Allow users to demote attachments to Level 2” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO254 - Outlook
- Vuln IDs
-
- V-17570
- Rule IDs
-
- SV-33589r1_rule
Checks: C-34052r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt When accessing the Formula property of a UserProperty object” must be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-29733r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt When accessing the Formula property of a UserProperty object” to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO253 - Outlook
- Vuln IDs
-
- V-17571
- Rule IDs
-
- SV-33592r1_rule
Checks: C-34054r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when executing Save As” must be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMSaveAs is REG_DWORD = 0, this is not a finding.
Fix: F-29734r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when executing Save As” to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO251 - Outlook
- Vuln IDs
-
- V-17572
- Rule IDs
-
- SV-33593r1_rule
Checks: C-34055r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when reading address information” must be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMAddressInformationAccess is REG_DWORD = 0, this is not a finding.
Fix: F-29735r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when reading address information” to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO252 - Outlook
- Vuln IDs
-
- V-17573
- Rule IDs
-
- SV-33594r1_rule
Checks: C-34056r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when responding to meeting and task requests” must be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMMeetingTaskRequestResponse is REG_DWORD = 0, this is not a finding.
Fix: F-29736r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when responding to meeting and task requests" to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO249 - Outlook
- Vuln IDs
-
- V-17574
- Rule IDs
-
- SV-33595r1_rule
Checks: C-34057r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when sending mail” must be set to “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMSend is REG_DWORD = 0, this is not a finding.
Fix: F-29737r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security “Configure Outlook object model prompt when sending mail” to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO256 - Outlook
- Vuln IDs
-
- V-17575
- Rule IDs
-
- SV-33596r1_rule
Checks: C-34058r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins “Configure trusted add-ins” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\Outlook\security\trustedaddins Criteria: If the registry key exists, this is a finding.
Fix: F-29738r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins “Configure trusted add-ins” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO226 - Outlook
- Vuln IDs
-
- V-17585
- Rule IDs
-
- SV-33506r1_rule
Checks: C-33992r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup “Dial–up options” must be set to “Enabled” and Hang up when finished sending, receiving, or updating is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Hangup after Spool is REG_DWORD = 1, this is not a finding.
Fix: F-29681r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup “Dial–up options” to “Enabled” and Hang up when finished sending, receiving, or updating is selected.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO225 - Outlook
- Vuln IDs
-
- V-17586
- Rule IDs
-
- SV-33507r1_rule
Checks: C-33993r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup “Dial–up options” must be set to “Enabled” and Warn before switching dial-up connection is selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Warn on Dialup is REG_DWORD = 1, this is not a finding.
Fix: F-29682r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Setup “Dial–up options” to “Enabled” and Warn before switching dial-up connection is selected.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO237 - Outlook
- Vuln IDs
-
- V-17587
- Rule IDs
-
- SV-33524r1_rule
Checks: C-34011r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Disable ‘Remember password’ for Internet e-mail accounts” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableRememberPwd is REG_DWORD = 0, this is not a finding.
Fix: F-29699r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Disable ‘Remember password’ for Internet e-mail accounts” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO243 - Outlook
- Vuln IDs
-
- V-17601
- Rule IDs
-
- SV-33581r1_rule
Checks: C-34042r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when closing an item” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value DontPromptLevel1AttachClose is REG_DWORD = 0, this is not a finding.
Fix: F-29725r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when closing an item” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO242 - Outlook
- Vuln IDs
-
- V-17602
- Rule IDs
-
- SV-33582r1_rule
Checks: C-34043r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when sending an item” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value DontPromptLevel1AttachSend is REG_DWORD = 0, this is not a finding.
Fix: F-29726r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Do not prompt about Level 1 attachments when sending an item” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO283 - Outlook
- Vuln IDs
-
- V-17610
- Rule IDs
-
- SV-33500r1_rule
Checks: C-33983r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Download full text of articles as HTML attachments” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value EnableFullTextHTML is REG_DWORD = 0, this is not a finding.
Fix: F-29672r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Download full text of articles as HTML attachments” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO277 - Outlook
- Vuln IDs
-
- V-17613
- Rule IDs
-
- SV-33597r1_rule
Checks: C-34059r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Allow hyperlinks in suspected phishing e-mail messages” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-29739r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Allow hyperlinks in suspected phishing e-mail messages” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO279 - Outlook
- Vuln IDs
-
- V-17615
- Rule IDs
-
- SV-33493r1_rule
Checks: C-33976r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange “Enable RPC encryption” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\rpc Criteria: If the value EnableRPCEncryption is REG_DWORD = 1, this is not a finding.
Fix: F-29660r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange “Enable RPC encryption” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO221 - Outlook
- Vuln IDs
-
- V-17624
- Rule IDs
-
- SV-33521r1_rule
Checks: C-34008r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail “Hide Junk Mail UI” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook Criteria: If the value DisableAntiSpam is REG_DWORD = 0, this is not a finding.
Fix: F-29696r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail “Hide Junk Mail UI” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO274 - Outlook
- Vuln IDs
-
- V-17630
- Rule IDs
-
- SV-33561r2_rule
Checks: C-34020r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Include Internet in Safe Zones for Automatic Picture Download” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-29706r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Include Internet in Safe Zones for Automatic Picture Download” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO275 - Outlook
- Vuln IDs
-
- V-17634
- Rule IDs
-
- SV-33562r2_rule
Checks: C-34021r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Include Intranet in Safe Zones for Automatic Picture Download” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-29708r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Include Intranet in Safe Zones for Automatic Picture Download” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO240 - Outlook
- Vuln IDs
-
- V-17671
- Rule IDs
-
- SV-33580r1_rule
Checks: C-34041r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Display Level 1 attachments” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-29724r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Display Level 1 attachments” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO270 - Outlook
- Vuln IDs
-
- V-17672
- Rule IDs
-
- SV-33548r1_rule
Checks: C-34015r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Display pictures and external content in HTML e-mail” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value BlockExtContent is REG_DWORD = 0, this is not a finding.
Fix: F-29703r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Display pictures and external content in HTML e-mail” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO227 - Outlook
- Vuln IDs
-
- V-17673
- Rule IDs
-
- SV-33504r1_rule
Checks: C-33988r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010-> Outlook Options -> Mail format “Do not allow signatures for e-mail messages” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\mailsettings Criteria: If the value DisableSignatures is REG_DWORD = 0, this is not a finding.
Fix: F-29677r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010-> Outlook Options -> Mail format “Do not allow signatures for e-mail messages” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO230 - Outlook
- Vuln IDs
-
- V-17674
- Rule IDs
-
- SV-33509r1_rule
Checks: C-33995r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Do not allow folders in non-default stores to be set as folder home pages” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value NonDefaultStoreScript is REG_DWORD = 0, this is not a finding.
Fix: F-29684r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Do not allow folders in non-default stores to be set as folder home pages” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO233 - Outlook
- Vuln IDs
-
- V-17675
- Rule IDs
-
- SV-33510r1_rule
Checks: C-33996r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for public folders” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PublicFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-29685r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for public folders” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO232 - Outlook
- Vuln IDs
-
- V-17676
- Rule IDs
-
- SV-33511r1_rule
Checks: C-33997r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for shared folders” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value SharedFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-29686r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Do not allow Outlook object model scripts to run for shared folders” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO285 - Outlook
- Vuln IDs
-
- V-17678
- Rule IDs
-
- SV-33499r1_rule
Checks: C-33982r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars “Do not include Internet Calendar integration in Outlook” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\webcal Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-29671r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars “Do not include Internet Calendar integration in Outlook” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO269 - Outlook
- Vuln IDs
-
- V-17733
- Rule IDs
-
- SV-33572r1_rule
Checks: C-34035r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box “Attachment Secure Temporary Folder” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security\OutlookSecureTempFolder Criteria: If the registry key exists, this is a finding.
Fix: F-29718r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box “Attachment Secure Temporary Folder” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO280 - Outlook
- Vuln IDs
-
- V-17734
- Rule IDs
-
- SV-33486r1_rule
Checks: C-33970r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange “Authentication with Exchange Server” must be set to “Enabled (Kerberos/NTLM Password Authentication)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AuthenticationService is REG_DWORD = 9, this is not a finding.
Fix: F-29658r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange “Authentication with Exchange Server” to “Enabled (Kerberos/NTLM Password Authentication)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO278 - Outlook
- Vuln IDs
-
- V-17736
- Rule IDs
-
- SV-33487r2_rule
Checks: C-33971r2_chk
NOTE: If Outlook 2010 is configured to access DoD Enterprise Email, this check is not applicable. The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange “Automatically configure profile based on Active Directory Primary SMTP address” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\autodiscover Criteria: If the value ZeroConfigExchange is REG_DWORD = 1, this is not a finding.
Fix: F-29659r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Exchange “Automatically configure profile based on Active Directory Primary SMTP address” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO284 - Outlook
- Vuln IDs
-
- V-17738
- Rule IDs
-
- SV-33496r1_rule
Checks: C-33979r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars “Automatically download attachments” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\webcal Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-29670r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> Internet Calendars “Automatically download attachments” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO271 - Outlook
- Vuln IDs
-
- V-17739
- Rule IDs
-
- SV-33529r1_rule
Checks: C-34013r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value UnblockSpecificSenders is REG_DWORD = 0, this is not a finding.
Fix: F-29701r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Automatic Picture Download Settings “Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO229 - Outlook
- Vuln IDs
-
- V-17753
- Rule IDs
-
- SV-33508r1_rule
Checks: C-33994r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other “Make Outlook the default program for E-mail, Contacts, and Calendar” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\general Criteria: If the value Check Default Client is REG_DWORD = 1, this is not a finding.
Fix: F-29683r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other “Make Outlook the default program for E-mail, Contacts, and Calendar” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO260 - Outlook
- Vuln IDs
-
- V-17755
- Rule IDs
-
- SV-33563r1_rule
Checks: C-34024r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Message Formats” must be set to “Enabled (S\MIME)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value MsgFormats is REG_DWORD = 1, this is not a finding.
Fix: F-29709r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Message Formats” to “Enabled (S\MIME)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO268 - Outlook
- Vuln IDs
-
- V-17756
- Rule IDs
-
- SV-33574r2_rule
Checks: C-34036r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box “Missing root certificates” must be set to “Enabled (Error)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value SigStatusNoTrustDecision is REG_DWORD = 2, this is not a finding.
Fix: F-29720r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box “Missing root certificates” to “Enabled (Error)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO239 - Outlook
- Vuln IDs
-
- V-17760
- Rule IDs
-
- SV-33577r1_rule
Checks: C-34038r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings “Outlook Security Mode” must be “Enabled (Use Outlook Security Group Policy)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value AdminSecurityMode is REG_DWORD = 3, this is not a finding.
Fix: F-29722r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings “Outlook Security Mode” to “Enabled (Use Outlook Security Group Policy)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO228 - Outlook
- Vuln IDs
-
- V-17761
- Rule IDs
-
- SV-33505r2_rule
Checks: C-33991r3_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail format -> Internet Formatting "Plain text options" must be set to "Enabled" where line length is "132" and that NO Check is visible in the "Encode all attachments in UUENCODE format when sending a plain text message" checkbox option. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\mailsettings Criteria: If the value PlainWrapLen is REG_DWORD = 132 (decimal), this is not a finding. AND HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Message Plain Format Mime is REG_DWORD = 1, this is not a finding.
Fix: F-29680r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail format -> Internet Formatting "Plain text -> options" to "Enabled" where line length is "132" and that NO Check is visible in the "Encode all attachments in UUENCODE format when sending a plain text message" checkbox option.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO217 - Outlook
- Vuln IDs
-
- V-17762
- Rule IDs
-
- SV-33514r1_rule
Checks: C-34001r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Prevent publishing to a DAV server” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value DisableDav is REG_DWORD = 1, this is not a finding.
Fix: F-29689r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Prevent publishing to a DAV server” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO216 - Outlook
- Vuln IDs
-
- V-17763
- Rule IDs
-
- SV-33515r1_rule
Checks: C-34002r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Prevent publishing to Office.com” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value DisableOfficeOnline is REG_DWORD = 1, this is not a finding.
Fix: F-29690r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Prevent publishing to Office.com” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO238 - Outlook
- Vuln IDs
-
- V-17766
- Rule IDs
-
- SV-33525r1_rule
Checks: C-34012r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Prevent users from customizing attachment security settings” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-29700r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Prevent users from customizing attachment security settings” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO214 - Outlook
- Vuln IDs
-
- V-17770
- Rule IDs
-
- SV-33518r1_rule
Checks: C-34005r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options “Read e-mail as plain text” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value ReadAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-29693r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options “Read e-mail as plain text” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO215 - Outlook
- Vuln IDs
-
- V-17771
- Rule IDs
-
- SV-33519r1_rule
Checks: C-34006r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options “Read signed e-mail as plain text” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value ReadSignedAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-29694r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> E-mail Options “Read signed e-mail as plain text” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO244 - Outlook
- Vuln IDs
-
- V-17774
- Rule IDs
-
- SV-33583r1_rule
Checks: C-34044r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 1” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security\FileExtensionsRemoveLevel1 Criteria: If registry key exist, this is a finding.
Fix: F-29727r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 1” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO245 - Outlook
- Vuln IDs
-
- V-17775
- Rule IDs
-
- SV-33585r1_rule
Checks: C-34045r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 2” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security\FileExtensionsRemoveLevel2 Criteria: If registry key exist, this is a finding.
Fix: F-29728r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Attachment Security “Remove file extensions blocked as Level 2” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO218 - Outlook
- Vuln IDs
-
- V-17776
- Rule IDs
-
- SV-33516r1_rule
Checks: C-34003r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Restrict level of calendar details users can publish” must be “Enabled (Disables ‘Full details’ and ‘Limited details’)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value PublishCalendarDetailsPolicy is REG_DWORD = 4000 (hex) or 16384 (Decimal), this is not a finding.
Fix: F-29691r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Restrict level of calendar details users can publish” to “Enabled (Disables ‘Full details’ and ‘Limited details’)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO220 - Outlook
- Vuln IDs
-
- V-17777
- Rule IDs
-
- SV-33517r1_rule
Checks: C-34004r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Restrict upload method” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\pubcal Criteria: If the value SingleUploadOnly is REG_DWORD = 1, this is not a finding.
Fix: F-29692r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service “Restrict upload method” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO267 - Outlook
- Vuln IDs
-
- V-17778
- Rule IDs
-
- SV-33880r1_rule
Checks: C-34037r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box “Retrieving CRLs (Certificate Revocation Lists)” must be “Enabled (When online always retrieve the CRL)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value UseCRLChasing is REG_DWORD = 1, this is not a finding.
Fix: F-29721r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography -> Signature Status dialog box “Retrieving CRLs (Certificate Revocation Lists)” to “Enabled (When online always retrieve the CRL)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO262 - Outlook
- Vuln IDs
-
- V-17787
- Rule IDs
-
- SV-33565r1_rule
Checks: C-34025r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Run in FIPS compliant mode” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value FIPSMode is REG_DWORD = 1, this is not a finding.
Fix: F-29710r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Run in FIPS compliant mode” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO257 - Outlook
- Vuln IDs
-
- V-17790
- Rule IDs
-
- SV-33566r1_rule
Checks: C-34027r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “S/MIME interoperability with external clients” must be set to “Enabled (Handle internally)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ExternalSMime is REG_DWORD = 0, this is not a finding.
Fix: F-29712r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “S/MIME interoperability with external clients” to “Enabled (Handle internally)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO266 - Outlook
- Vuln IDs
-
- V-17795
- Rule IDs
-
- SV-33568r1_rule
Checks: C-34030r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “S/MIME receipt requests behavior” must be “Enabled (Never send S\MIME receipts)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value RespondToReceiptRequests is REG_DWORD = 2, this is not a finding.
Fix: F-29714r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “S/MIME receipt requests behavior” to “Enabled (Never send S\MIME receipts)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO276 - Outlook
- Vuln IDs
-
- V-17798
- Rule IDs
-
- SV-33598r1_rule
Checks: C-34060r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Security setting for macros” must be “Enabled (Always warn)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value Level is REG_DWORD = 2, this is not a finding.
Fix: F-29740r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Security setting for macros” to “Enabled (Always warn)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO264 - Outlook
- Vuln IDs
-
- V-17800
- Rule IDs
-
- SV-33570r1_rule
Checks: C-34032r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Send all signed messages as clear signed messages” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ClearSign is REG_DWORD = 1, this is not a finding.
Fix: F-29715r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Send all signed messages as clear signed messages” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO247 - Outlook
- Vuln IDs
-
- V-17802
- Rule IDs
-
- SV-33587r1_rule
Checks: C-34048r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security “Set Outlook object model Custom Actions execution prompt” must be “Enabled (Automatically Deny)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value PromptOOMCustomAction is REG_DWORD = 0, this is not a finding.
Fix: F-29730r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security “Set Outlook object model Custom Actions execution prompt” to “Enabled (Automatically Deny)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO265 - Outlook
- Vuln IDs
-
- V-17803
- Rule IDs
-
- SV-33571r1_rule
Checks: C-34033r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Signature Warning” must be “Enabled (Always warn about invalid signatures)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value WarnAboutInvalid is REG_DWORD = 1, this is not a finding.
Fix: F-29717r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Signature Warning” to “Enabled (Always warn about invalid signatures)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO281 - Outlook
- Vuln IDs
-
- V-17806
- Rule IDs
-
- SV-33501r1_rule
Checks: C-33984r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Synchronize Outlook RSS Feeds with Common Feed List” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value SyncToSysCFL is REG_DWORD = 0, this is not a finding.
Fix: F-29673r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Synchronize Outlook RSS Feeds with Common Feed List” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO223 - Outlook
- Vuln IDs
-
- V-17807
- Rule IDs
-
- SV-33522r1_rule
Checks: C-34009r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail “Trust E-mail from Contacts” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value JunkMailTrustContacts is REG_DWORD = 1, this is not a finding.
Fix: F-29697r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Preferences -> Junk E-mail “Trust E-mail from Contacts” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO282 - Outlook
- Vuln IDs
-
- V-17808
- Rule IDs
-
- SV-33502r1_rule
Checks: C-33986r1_chk
================================== NOTE: Some operational environments may elect to allow use of RSS feeds integrated into Outlook, provided there is a mission need and the network environment meets the following criteria: - both the web site issuing the RSS feeds and the Outlook e-mail client both have an available network path to each other - neither the web site issuing the RSS feeds nor the Outlook e-mail client have a network path to the public Internet. An example of such an environment would be a closed lab or other deployed network where the requisite signoffs, artifacts, and network documentation demonstrate that the Public Internet is not available to the Outlook client, preventing unauthorized RSS subscriptions being accessed by users of the Outlook client. The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” must be set to “Disabled”. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the environment meets the above stated criteria, and value "Disable" is REG_DWORD = 0, this is not a finding. For all environments where the Outlook e-mail client has access to public Internet web sites, RSS integration into Outlook is not permitted, and should be validated as follows. ================================= The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-29674r1_fix
================================== NOTE: If the use of RSS feeds integrated into Outlook is a mission need, and the network environment is configured with the following criteria: 1. Both the web site issuing the RSS feeds and the Outlook e-mail client must both have an available network path to each other. 2. Neither the web site issuing the RSS feeds nor the Outlook e-mail client have a network path to the public Internet. Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” to “Disabled”. For all environments where the Outlook e-mail clients have access to public Internet web sites, RSS integration into Outlook is not permitted, and should be configured as follows. ================================= Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Turn off RSS feature” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO231 - Outlook
- Vuln IDs
-
- V-17812
- Rule IDs
-
- SV-33512r1_rule
Checks: C-33999r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Use Unicode format when dragging e-mail message to file system” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\general Criteria: If the value MSGFormat is REG_DWORD = 0, this is not a finding.
Fix: F-29687r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Other -> Advanced “Use Unicode format when dragging e-mail message to file system” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO286 - Outlook
- Vuln IDs
-
- V-17944
- Rule IDs
-
- SV-33503r1_rule
Checks: C-33987r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Meeting Workspace “Disable user entries to server list” must be set to “Enabled (Publish default, disallow others)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\meetings\profile Criteria: If the value ServerUI is REG_DWORD = 2, this is not a finding.
Fix: F-29675r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Meeting Workspace “Disable user entries to server list” to “Enabled (Publish default, disallow others)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO126 - Outlook
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-33782r1_rule
Checks: C-34158r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management” must be set to “Enabled” and ‘outlook.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29847r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management ” to “Enabled” and ‘outlook.exe’ is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209 - Outlook
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-33790r1_rule
Checks: C-34166r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” must be set to “Enabled” and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29855r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” to “Enabled” and 'outlook.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO211 - Outlook
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-33793r1_rule
Checks: C-34169r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” must be set to “Enabled” and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29858r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” to “Enabled” and 'outlook.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO132 - Outlook
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-33800r1_rule
Checks: C-34174r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” must be set to “Enabled” and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29863r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” to “Enabled” and select 'outlook.exe'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO124 - Outlook
- Vuln IDs
-
- V-26588
- Rule IDs
-
- SV-33806r1_rule
Checks: C-34180r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” must be set to “Enabled” and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29869r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” to “Enabled” and 'outlook.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO128 - Outlook
- Vuln IDs
-
- V-26590
- Rule IDs
-
- SV-33857r1_rule
Checks: C-34234r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Turn off Data Execution Prevention” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-29924r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Turn off Data Execution Prevention” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO305 - Outlook
- Vuln IDs
-
- V-26625
- Rule IDs
-
- SV-33811r1_rule
Checks: C-34185r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” must be “Enabled" and " Disallow in Outlook" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\toolbars\outlook Criteria: If the value NoExtensibilityCustomizationFromDocument is REG_DWORD = 1, this is not a finding.
Fix: F-29874r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” to “Enabled" and select "Disallow in Outlook".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO313 - Outlook
- Vuln IDs
-
- V-26632
- Rule IDs
-
- SV-34101r1_rule
Checks: C-34228r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Automatically download enclosures” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\rss Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-29918r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Account Settings -> RSS Feeds “Automatically download enclosures” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO344 - Outlook
- Vuln IDs
-
- V-26633
- Rule IDs
-
- SV-34103r1_rule
Checks: C-34229r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting “Outlook Rich Text options” must be “Enabled: Convert to Plain Text format". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value Message RTF Format is REG_DWORD = 1, this is not a finding.
Fix: F-29919r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting “Outlook Rich Text options” to “Enabled: Convert to Plain Text format".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO314 - Outlook
- Vuln IDs
-
- V-26634
- Rule IDs
-
- SV-34105r1_rule
Checks: C-34230r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting -> Message Format “Set message format” must be “Enabled: Plain Text". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value EditorPreference is REG_DWORD = 65536 (dec), this is not a finding.
Fix: F-29920r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Outlook Options -> Mail Format -> Internet Formatting -> Message Format “Set message format” to “Enabled: Plain Text".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO315 - Outlook
- Vuln IDs
-
- V-26635
- Rule IDs
-
- SV-34106r1_rule
Checks: C-34231r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Prompt user to choose security settings if default settings fail” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value ForceDefaultProfile is REG_DWORD = 0, this is not a finding.
Fix: F-29921r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security “Prompt user to choose security settings if default settings fail” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO316 - Outlook
- Vuln IDs
-
- V-26636
- Rule IDs
-
- SV-34107r1_rule
Checks: C-34232r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography “Minimum encryption settings” must be set to “Enabled: 168 bits". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value MinEncKey is REG_DWORD = 168, this is not a finding.
Fix: F-29922r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography “Minimum encryption settings” to “Enabled: 168 bits".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO317 - Outlook
- Vuln IDs
-
- V-26637
- Rule IDs
-
- SV-34109r1_rule
Checks: C-34233r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography “Replies or forwards to signed/encrypted messages are signed/encrypted” must be set to “Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value NoCheckOnSessionSecurity is REG_DWORD = 1, this is not a finding.
Fix: F-29923r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cyrptography “Replies or forwards to signed/encrypted messages are signed/encrypted” to “Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO320 - Outlook
- Vuln IDs
-
- V-26702
- Rule IDs
-
- SV-34110r1_rule
Checks: C-34435r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Do not check e-mail address against address of certificates being used” must be set to “Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value SupressNameChecks is REG_DWORD = 1, this is not a finding.
Fix: F-30017r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Cryptography “Do not check e-mail address against address of certificates being used” to “Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO425
- Vuln IDs
-
- V-41493
- Rule IDs
-
- SV-55984r1_rule
Checks: C-49263r2_chk
Verify "Internet and network path into hyperlinks" is not configured. 1. From the main Outlook window, go to Tools > Options 2. Click on the Mail Format tab > Editor Options 3. In the left pane, navigate to and click on Proofing 4. In the right pane, click on the AutoCorrect Option button 5. Click on the AutoFormat tab Criteria: If the "Internet and network path into hyperlinks" checkbox is unchecked, this is not a finding.
Fix: F-48823r3_fix
1. From the main Outlook window, go to Tools > Options 2. Click on the Mail Format tab > Editor Options 3. In the left pane, navigate to and click on Proofing 4. In the right pane, click on the AutoCorrect Option button 5. Click on the AutoFormat tab "Internet and network path into hyperlinks" checkbox must be unchecked.