Microsoft Outlook 2013 STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 79
Comparison against the immediately-prior release (V1R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 79
- V-17173 Medium description Disabling of user name and password syntax from being used in URLs must be enforced.
- V-17174 Medium description The Internet Explorer Bind to Object functionality must be enabled.
- V-17175 Medium description The Saved from URL mark must be selected to enforce Internet zone processing.
- V-17183 Medium description Navigation to URLs embedded in Office products must be blocked.
- V-17184 Medium description Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-17470 Medium description Permit download of content from safe zones must be configured.
- V-17546 Medium description Access restriction settings for published calendars must be configured.
- V-17558 Medium description Recipients of sent email must be unable to be added to the safe senders list.
- V-17559 Medium description ActiveX One-Off forms must be configured.
- V-17562 Medium description Scripts in One-Off Outlook forms must be disallowed.
- V-17564 Medium description IE Trusted Zones assumed trusted must be blocked.
- V-17566 Medium description The Add-In Trust Level must be configured.
- V-17568 Medium description Object Model Prompt behavior for programmatic address books must be configured.
- V-17569 Medium description Action to demote an EMail Level 1 attachment to Level 2 must be configured.
- V-17570 Medium description Object Model Prompt behavior for accessing User Property Formula must be configured.
- V-17571 Medium description Object Model Prompt behavior for the SaveAs method must be configured.
- V-17572 Medium description Object Model Prompt behavior for programmatic access of user address data must be configured.
- V-17573 Medium description Object Model Prompt behavior for Meeting and Task Responses must be configured.
- V-17574 Medium description Object Model Prompt for programmatic email send behavior must be configured.
- V-17575 Medium description Trusted add-ins behavior for email must be configured.
- V-17587 Medium description The remember password for internet e-mail accounts must be disabled.
- V-17601 Medium description The prompt to display level 1 attachments must be disallowed when closing an item.
- V-17602 Medium description The prompt to display level 1 attachments must be disallowed when sending an item.
- V-17610 Medium description Disabling download full text of articles as HTML must be configured.
- V-17613 Medium description Hyperlinks in suspected phishing email messages must be disallowed.
- V-17615 Medium description RPC encryption between Outlook and Exchange server must be enforced.
- V-17624 Medium description Junk Mail UI must be configured.
- V-17630 Medium description Internet with Safe Zones for Picture Download must be disabled.
- V-17634 Medium description Intranet with Safe Zones for automatic picture downloads must be configured.
- V-17671 Medium description The ability to display level 1 attachments must be disallowed.
- V-17672 Medium description External content and pictures in HTML email must be displayed.
- V-17673 Medium description The ability to add signatures to email messages must be allowed.
- V-17674 Medium description Folders in non-default stores, set as folder home pages, must be disallowed.
- V-17675 Medium description Outlook Object Model scripts must be disallowed to run for public folders.
- V-17676 Medium description Outlook Object Model scripts must be disallowed to run for shared folders.
- V-17678 Medium description Internet calendar integration in Outlook must be disabled.
- V-17733 Medium description Attachments using generated name for secure temporary folders must be configured.
- V-17734 Medium description Outlook must be configured to force authentication when connecting to an Exchange server.
- V-17738 Medium description Automatic download of Internet Calendar appointment attachments must be disallowed.
- V-17739 Medium description Automatic download content for email in Safe Senders list must be disallowed.
- V-17753 Medium description Outlook must be enforced as the default email, calendar, and contacts program.
- V-17755 Medium description Message formats must be set to use SMime.
- V-17756 Medium description Missing Root Certificates warning must be enforced.
- V-17760 Medium description Outlook Security Mode must be configured to use Group Policy settings.
- V-17761 Medium description Plain Text Options for outbound email must be configured.
- V-17762 Medium description Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
- V-17763 Medium description Publishing calendars to Office Online must be prevented.
- V-17766 Medium description Users customizing attachment security settings must be prevented.
- V-17770 Medium description Read EMail as plain text must be enforced.
- V-17771 Medium description Read signed email as plain text must be enforced.
- V-17774 Medium description Level 1 file extensions must be blocked and not removed.
- V-17775 Medium description Level 2 file extensions must be blocked and not removed.
- V-17776 Medium description Level of calendar details that a user can publish must be restricted.
- V-17777 Medium description Upload method for publishing calendars to Office Online must be restricted.
- V-17787 Medium description Run in FIPS compliant mode must be enforced.
- V-17790 Medium description S/Mime interoperability with external clients for message handling must be configured.
- V-17795 Medium description Automatic sending s/Mime receipt requests must be disallowed.
- V-17798 Medium descriptioncheckfix Always warn on untrusted macros must be enforced.
- V-17800 Medium description Send all signed messages as clear signed messages must be configured.
- V-17802 Medium description Custom Outlook Object Model (OOM) action execution prompts must be configured.
- V-17803 Medium description Warning about invalid signatures must be enforced.
- V-17806 Medium description RSS feed synchronization with Common Feed List must be disallowed.
- V-17807 Medium description Trust EMail from senders in receivers contact list must be enforced.
- V-17808 Medium description RSS Feeds must be disallowed.
- V-17812 Medium description Dragging Unicode email messages to file system must be disallowed.
- V-17944 Medium description User Entries to Server List must be disallowed.
- V-26584 Medium description Add-on Management functionality must be allowed.
- V-26585 Medium description Protection from zone elevation must be enforced.
- V-26586 Medium description ActiveX installs must be configured for proper restrictions.
- V-26587 Medium description File Downloads must be configured for proper restrictions.
- V-26588 Medium description Scripted Window Security must be enforced.
- V-26625 Medium description Outlook 2013 application must be prevented from loading any custom user interface (UI) code.
- V-26632 Medium description Automatically downloading enclosures on RSS must be disallowed.
- V-26633 Medium description Outlook Rich Text options must be set for converting to plain text format.
- V-26634 Medium description Default message format must be set to use Plain Text.
- V-26635 Medium description Outlook must be configured not to prompt users to choose security settings if default settings fail.
- V-26636 Medium description Outlook minimum encryption key length settings must be set.
- V-26637 Medium description Replies or forwards to signed/encrypted messages must be signed/encrypted.
- V-26702 Medium description Check e-mail addresses against addresses of certificates being used must be disallowed.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-33404r2_rule
Checks: C-47898r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" is "Enabled" and a check in the 'outlook.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46750r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-53848r1_rule
Checks: C-47899r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" is "Enabled" and a check in the 'outlook.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46752r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-53850r1_rule
Checks: C-47900r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" is "Enabled" and a check in the 'outlook.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46754r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-53853r1_rule
Checks: C-47901r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" is "Enabled" and a check in the 'outlook.exe' check box is present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46757r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-53863r1_rule
Checks: C-47904r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" is "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46767r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and select 'outlook.exe'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO272
- Vuln IDs
-
- V-17470
- Rule IDs
-
- SV-54046r1_rule
Checks: C-47984r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Do not permit download of content from safe zones" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value UnblockSafeZone is REG_DWORD = 1, this is not a finding.
Fix: F-46925r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Do not permit download of content from safe zones" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO219
- Vuln IDs
-
- V-17546
- Rule IDs
-
- SV-53872r1_rule
Checks: C-47913r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Access to published calendars" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\pubcal Criteria: If the value RestrictedAccessOnly is REG_DWORD = 1, this is not a finding.
Fix: F-46777r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Access to published calendars" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO224
- Vuln IDs
-
- V-17558
- Rule IDs
-
- SV-53885r1_rule
Checks: C-47917r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Junk E-mail "Add e-mail recipients to users' Safe Senders Lists" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value JunkMailTrustOutgoingRecipients is REG_DWORD = 0, this is not a finding.
Fix: F-46790r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Junk E-mail "Add e-mail recipients to users' Safe Senders Lists" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO234
- Vuln IDs
-
- V-17559
- Rule IDs
-
- SV-53915r1_rule
Checks: C-47927r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Allow Active X One Off Forms" is set to "Enabled: Load only Outlook Controls". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value AllowActiveXOneOffForms is REG_DWORD = 0, this is not a finding.
Fix: F-46815r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Allow Active X One Off Forms" to "Enabled: Load only Outlook Controls".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO246
- Vuln IDs
-
- V-17562
- Rule IDs
-
- SV-53993r1_rule
Checks: C-47964r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Custom Form Security "Allow scripts in one-off Outlook forms" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding
Fix: F-46882r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Custom Form Security "Allow scripts in one-off Outlook forms" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO273
- Vuln IDs
-
- V-17564
- Rule IDs
-
- SV-54047r1_rule
Checks: C-47985r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Block Trusted Zones" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value TrustedZone is REG_DWORD = 0, this is not a finding.
Fix: F-46926r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Block Trusted Zones" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO236
- Vuln IDs
-
- V-17566
- Rule IDs
-
- SV-53919r1_rule
Checks: C-47930r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Configure Add-In Trust Level" is set to "Enabled (Trust all loaded and installed COM addins)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value AddinTrust is REG_DWORD = 1, this is not a finding.
Fix: F-46819r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Configure Add-In Trust Level" to "Enabled (Trust all loaded and installed COM addins)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO250
- Vuln IDs
-
- V-17568
- Rule IDs
-
- SV-53997r1_rule
Checks: C-47967r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when accessing an address book" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PromptOOMAddressBookAccess is REG_DWORD = 0, this is not a finding.
Fix: F-46886r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when accessing an address book" to "Enabled (Automatically Deny)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO241
- Vuln IDs
-
- V-17569
- Rule IDs
-
- SV-53954r1_rule
Checks: C-47959r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Allow users to demote attachments to Level 2" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value AllowUsersToLowerAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-46853r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Allow users to demote attachments to Level 2" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO254
- Vuln IDs
-
- V-17570
- Rule IDs
-
- SV-54001r1_rule
Checks: C-47971r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-46890r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" to "Enabled (Automatically Deny)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO253
- Vuln IDs
-
- V-17571
- Rule IDs
-
- SV-54000r1_rule
Checks: C-47970r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when executing Save As" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PromptOOMSaveAs is REG_DWORD = 0, this is not a finding.
Fix: F-46889r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when executing Save As" to "Enabled (Automatically Deny)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO251
- Vuln IDs
-
- V-17572
- Rule IDs
-
- SV-53998r1_rule
Checks: C-47968r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when reading address information" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PromptOOMAddressInformationAccess is REG_DWORD = 0, this is not a finding.
Fix: F-46887r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when reading address information" to "Enabled (Automatically Deny)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO252
- Vuln IDs
-
- V-17573
- Rule IDs
-
- SV-55912r1_rule
Checks: C-47969r2_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when responding to meeting and task requests" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PromptOOMMeetingTaskRequestResponse is REG_DWORD = 0, this is not a finding.
Fix: F-46888r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when responding to meeting and task requests" to "Enabled (Automatically Deny)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO249
- Vuln IDs
-
- V-17574
- Rule IDs
-
- SV-53996r1_rule
Checks: C-47966r2_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when sending mail" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PromptOOMSend is REG_DWORD = 0, this is not a finding.
Fix: F-46885r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when sending mail" to "Enabled (Automatically Deny)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO256
- Vuln IDs
-
- V-17575
- Rule IDs
-
- SV-54002r2_rule
Checks: C-47972r2_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins "Configure trusted add-ins" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\Outlook\security\trustedaddins In some reported configurations, the registry key remains after disabling the setting but the value is empty. If the registry key exists, with entries, this is a finding. If the registry key exists, but with no entries, this is not a finding.
Fix: F-46891r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins "Configure trusted add-ins" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO237
- Vuln IDs
-
- V-17587
- Rule IDs
-
- SV-53923r1_rule
Checks: C-47935r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Disable 'Remember password' for Internet e-mail accounts" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value EnableRememberPwd is REG_DWORD = 0, this is not a finding.
Fix: F-46823r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Disable 'Remember password' for Internet e-mail accounts" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO243
- Vuln IDs
-
- V-17601
- Rule IDs
-
- SV-53976r2_rule
Checks: C-47961r5_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when closing an item" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value DontPromptLevel1AttachClose is REG_DWORD = 0, this is not a finding.
Fix: F-46871r4_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when closing an item" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO242
- Vuln IDs
-
- V-17602
- Rule IDs
-
- SV-53957r2_rule
Checks: C-47960r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when sending an item" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value DontPromptLevel1AttachSend is REG_DWORD = 0, this is not a finding.
Fix: F-46855r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Do not prompt about Level 1 attachments when sending an item" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO283
- Vuln IDs
-
- V-17610
- Rule IDs
-
- SV-54056r1_rule
Checks: C-47996r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Download full text of articles as HTML attachments" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\rss Criteria: If the value EnableFullTextHTML is REG_DWORD = 0, this is not a finding.
Fix: F-46936r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Download full text of articles as HTML attachments" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO277
- Vuln IDs
-
- V-17613
- Rule IDs
-
- SV-54051r1_rule
Checks: C-47990r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-46930r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO279
- Vuln IDs
-
- V-17615
- Rule IDs
-
- SV-54052r1_rule
Checks: C-47992r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Exchange "Enable RPC encryption" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\rpc Criteria: If the value EnableRPCEncryption is REG_DWORD = 1, this is not a finding.
Fix: F-46932r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Exchange "Enable RPC encryption" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO221
- Vuln IDs
-
- V-17624
- Rule IDs
-
- SV-53874r1_rule
Checks: C-47915r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Junk E-mail "Hide Junk Mail UI" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook Criteria: If the value DisableAntiSpam is REG_DWORD = 0, this is not a finding.
Fix: F-46779r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Junk E-mail "Hide Junk Mail UI" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO274
- Vuln IDs
-
- V-17630
- Rule IDs
-
- SV-54048r1_rule
Checks: C-47986r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Include Internet in Safe Zones for Automatic Picture Download" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-46927r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Include Internet in Safe Zones for Automatic Picture Download" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO275
- Vuln IDs
-
- V-17634
- Rule IDs
-
- SV-54049r1_rule
Checks: C-47988r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Include Intranet in Safe Zones for Automatic Picture Download" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-46928r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Include Intranet in Safe Zones for Automatic Picture Download" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO240
- Vuln IDs
-
- V-17671
- Rule IDs
-
- SV-53941r1_rule
Checks: C-47948r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Display Level 1 attachments" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-46841r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Display Level 1 attachments" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO270
- Vuln IDs
-
- V-17672
- Rule IDs
-
- SV-54042r3_rule
Checks: C-47982r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2013 >> Security >> Automatic Picture Download Settings "Display pictures and external content in HTML e-mail" is set to "Enabled". NOTE: When this setting is Enabled, Outlook 2007 does block automatic download of content from external servers unless the sender is included in the Safe Senders list. Recipients can choose to download external content from untrusted senders on a message-by-message basis. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value BlockExtContent is REG_DWORD = 1, this is not a finding.
Fix: F-46922r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Display pictures and external content in HTML e-mail" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO227
- Vuln IDs
-
- V-17673
- Rule IDs
-
- SV-53886r1_rule
Checks: C-47918r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013-> Outlook Options -> Mail format "Do not allow signatures for e-mail messages" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\common\mailsettings Criteria: If the value DisableSignatures is REG_DWORD = 0, this is not a finding.
Fix: F-46791r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Mail format "Do not allow signatures for e-mail messages" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO230
- Vuln IDs
-
- V-17674
- Rule IDs
-
- SV-53893r1_rule
Checks: C-47921r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Do not allow folders in non-default stores to be set as folder home pages" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value NonDefaultStoreScript is REG_DWORD = 0, this is not a finding.
Fix: F-46800r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Do not allow folders in non-default stores to be set as folder home pages" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO233
- Vuln IDs
-
- V-17675
- Rule IDs
-
- SV-53903r1_rule
Checks: C-47924r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for public folders" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PublicFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-46807r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for public folders" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO232
- Vuln IDs
-
- V-17676
- Rule IDs
-
- SV-53899r1_rule
Checks: C-47923r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for shared folders" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value SharedFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-46803r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for shared folders" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO285
- Vuln IDs
-
- V-17678
- Rule IDs
-
- SV-54058r1_rule
Checks: C-47998r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Internet Calendars "Do not include Internet Calendar integration in Outlook" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\webcal Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-46938r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Internet Calendars "Do not include Internet Calendar integration in Outlook" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO269
- Vuln IDs
-
- V-17733
- Rule IDs
-
- SV-54038r1_rule
Checks: C-47981r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography -> Signature Status dialog box "Attachment Secure Temporary Folder" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security\OutlookSecureTempFolder Criteria: If the registry key exists, this is a finding.
Fix: F-46920r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography -> Signature Status dialog box "Attachment Secure Temporary Folder" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO280
- Vuln IDs
-
- V-17734
- Rule IDs
-
- SV-54053r1_rule
Checks: C-47993r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Exchange "Authentication with Exchange Server" is set to "Enabled (Kerberos/NTLM Password Authentication)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value AuthenticationService is REG_DWORD = 9, this is not a finding.
Fix: F-46933r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Exchange "Authentication with Exchange Server" to "Enabled (Kerberos/NTLM Password Authentication)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO284
- Vuln IDs
-
- V-17738
- Rule IDs
-
- SV-54057r1_rule
Checks: C-47997r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Internet Calendars "Automatically download attachments" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\webcal Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-46937r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Internet Calendars "Automatically download attachments" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO271
- Vuln IDs
-
- V-17739
- Rule IDs
-
- SV-54044r1_rule
Checks: C-47983r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value UnblockSpecificSenders is REG_DWORD = 0, this is not a finding.
Fix: F-46924r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Automatic Picture Download Settings "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO229
- Vuln IDs
-
- V-17753
- Rule IDs
-
- SV-53891r1_rule
Checks: C-47920r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other "Make Outlook the default program for E-mail, Contacts, and Calendar" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\general Criteria: If the value Check Default Client is REG_DWORD = 1, this is not a finding.
Fix: F-46798r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other "Make Outlook the default program for E-mail, Contacts, and Calendar" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO260
- Vuln IDs
-
- V-17755
- Rule IDs
-
- SV-54004r1_rule
Checks: C-47974r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Message Formats" is set to "Enabled (S\MIME)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value MsgFormats is REG_DWORD = 1, this is not a finding.
Fix: F-46893r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Message Formats" to "Enabled (S\MIME)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO268
- Vuln IDs
-
- V-17756
- Rule IDs
-
- SV-54033r1_rule
Checks: C-47980r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography -> Signature Status dialog box "Missing root certificates" is set to "Enabled (Error)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value SigStatusNoTrustDecision is REG_DWORD = 2, this is not a finding.
Fix: F-46918r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography -> Signature Status dialog box "Missing root certificates" to "Enabled (Error)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO239
- Vuln IDs
-
- V-17760
- Rule IDs
-
- SV-53934r1_rule
Checks: C-47944r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings "Outlook Security Mode" is "Enabled (Use Outlook Security Group Policy)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value AdminSecurityMode is REG_DWORD = 3, this is not a finding.
Fix: F-46834r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings "Outlook Security Mode" to "Enabled (Use Outlook Security Group Policy)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO228
- Vuln IDs
-
- V-17761
- Rule IDs
-
- SV-53887r1_rule
Checks: C-47919r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Mail format -> Internet Formatting "Plain text options" is set to "Enabled" where line length is "132" and that a check does not exist in the "Encode all attachments in UUENCODE format when sending a plain text message" check box option. Procedure: Use the Windows Registry Editor to navigate to the following key: Criteria: If the value for HKCU\Software\Policies\Microsoft\Office\15.0\common\mailsettings\PlainWrapLen is REG_DWORD = 132 (decimal) and the value for HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail\Message Plain Format Mime is REG_DWORD = 1, this is not a finding.
Fix: F-46793r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Mail format -> Internet Formatting "Plain text -> options" to "Enabled" where line length is "132" and that NO Check is visible in the "Encode all attachments in UUENCODE format when sending a plain text message" check box option.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO217
- Vuln IDs
-
- V-17762
- Rule IDs
-
- SV-53870r1_rule
Checks: C-47911r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to a DAV server" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\pubcal Criteria: If the value DisableDav is REG_DWORD = 1, this is not a finding.
Fix: F-46775r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to a DAV server" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO216
- Vuln IDs
-
- V-17763
- Rule IDs
-
- SV-53869r1_rule
Checks: C-47910r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to Office.com" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\pubcal Criteria: If the value DisableOfficeOnline is REG_DWORD = 1, this is not a finding.
Fix: F-46774r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to Office.com" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO238
- Vuln IDs
-
- V-17766
- Rule IDs
-
- SV-53929r1_rule
Checks: C-47939r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Prevent users from customizing attachment security settings" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-46829r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Prevent users from customizing attachment security settings" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO214
- Vuln IDs
-
- V-17770
- Rule IDs
-
- SV-53867r1_rule
Checks: C-47908r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> E-mail Options "Read e-mail as plain text" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value ReadAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-46772r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> E-mail Options "Read e-mail as plain text" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO215
- Vuln IDs
-
- V-17771
- Rule IDs
-
- SV-53868r1_rule
Checks: C-47909r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> E-mail Options "Read signed e-mail as plain text" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value ReadSignedAsPlain is REG_DWORD = 1, this is not a finding.
Fix: F-46773r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> E-mail Options "Read signed e-mail as plain text" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO244
- Vuln IDs
-
- V-17774
- Rule IDs
-
- SV-55898r1_rule
Checks: C-47962r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 1" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security\FileExtensionsRemoveLevel1 Criteria: If the registry key exists, this is a finding.
Fix: F-46876r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 1" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO245
- Vuln IDs
-
- V-17775
- Rule IDs
-
- SV-53989r1_rule
Checks: C-47963r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 2" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security\FileExtensionsRemoveLevel2 Criteria: If the registry key exists, this is a finding.
Fix: F-46881r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 2" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO218
- Vuln IDs
-
- V-17776
- Rule IDs
-
- SV-53871r1_rule
Checks: C-47912r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict level of calendar details users can publish" is "Enabled (Disables 'Full details' and 'Limited details')". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\pubcal Criteria: If the value PublishCalendarDetailsPolicy is REG_DWORD = 4000 (hex) or 16384 (Decimal), this is not a finding.
Fix: F-46776r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict level of calendar details users can publish" to "Enabled (Disables 'Full details' and 'Limited details')".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO220
- Vuln IDs
-
- V-17777
- Rule IDs
-
- SV-53873r1_rule
Checks: C-47914r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict upload method" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\pubcal Criteria: If the value SingleUploadOnly is REG_DWORD = 1, this is not a finding.
Fix: F-46778r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict upload method" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO267
- Vuln IDs
-
- V-17778
- Rule IDs
-
- SV-54031r1_rule
Checks: C-47979r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" is "Enabled (When online always retrieve the CRL)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value UseCRLChasing is REG_DWORD = 1, this is not a finding.
Fix: F-46916r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" to "Enabled (When online always retrieve the CRL)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO262
- Vuln IDs
-
- V-17787
- Rule IDs
-
- SV-54005r1_rule
Checks: C-47975r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Run in FIPS compliant mode" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value FIPSMode is REG_DWORD = 1, this is not a finding.
Fix: F-46894r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Run in FIPS compliant mode" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO257
- Vuln IDs
-
- V-17790
- Rule IDs
-
- SV-54003r1_rule
Checks: C-47973r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "S/MIME interoperability with external clients" is set to "Enabled (Handle internally)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value ExternalSMime is REG_DWORD = 0, this is not a finding.
Fix: F-46892r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "S/MIME interoperability with external clients" to "Enabled (Handle internally)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO266
- Vuln IDs
-
- V-17795
- Rule IDs
-
- SV-54029r1_rule
Checks: C-47978r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "S/MIME receipt requests behavior" is "Enabled (Never send S\MIME receipts)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value RespondToReceiptRequests is REG_DWORD = 2, this is not a finding.
Fix: F-46913r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "S/MIME receipt requests behavior" to "Enabled (Never send S\MIME receipts)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO276
- Vuln IDs
-
- V-17798
- Rule IDs
-
- SV-54050r2_rule
Checks: C-47989r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2013 >> Security >> Trust Center "Security setting for macros" is "Enabled (Always warn)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value of "Level" is REG_DWORD = 2, this is not a finding.
Fix: F-46929r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2013 >> Security >> Trust Center "Security setting for macros" to "Enabled (Always warn)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO264
- Vuln IDs
-
- V-17800
- Rule IDs
-
- SV-54023r1_rule
Checks: C-47976r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Send all signed messages as clear signed messages" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value ClearSign is REG_DWORD = 1, this is not a finding.
Fix: F-46909r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Send all signed messages as clear signed messages" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO247
- Vuln IDs
-
- V-17802
- Rule IDs
-
- SV-53994r1_rule
Checks: C-47965r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Custom Form Security "Set Outlook object model Custom Actions execution prompt" is "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value PromptOOMCustomAction is REG_DWORD = 0, this is not a finding.
Fix: F-46883r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Security Form Settings -> Custom Form Security "Set Outlook object model Custom Actions execution prompt" to "Enabled (Automatically Deny)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO265
- Vuln IDs
-
- V-17803
- Rule IDs
-
- SV-54024r1_rule
Checks: C-47977r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Signature Warning" is "Enabled (Always warn about invalid signatures)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value WarnAboutInvalid is REG_DWORD = 1, this is not a finding.
Fix: F-46910r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Signature Warning" to "Enabled (Always warn about invalid signatures)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO281
- Vuln IDs
-
- V-17806
- Rule IDs
-
- SV-54054r1_rule
Checks: C-47994r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Synchronize Outlook RSS Feeds with Common Feed List" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\rss Criteria: If the value SyncToSysCFL is REG_DWORD = 0, this is not a finding.
Fix: F-46934r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Synchronize Outlook RSS Feeds with Common Feed List" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO223
- Vuln IDs
-
- V-17807
- Rule IDs
-
- SV-53882r1_rule
Checks: C-47916r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Junk E-mail "Trust E-mail from Contacts" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value JunkMailTrustContacts is REG_DWORD = 1, this is not a finding.
Fix: F-46788r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Junk E-mail "Trust E-mail from Contacts" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO282
- Vuln IDs
-
- V-17808
- Rule IDs
-
- SV-54055r2_rule
Checks: C-47995r7_chk
NOTE: Some operational environments may elect to allow use of RSS feeds integrated into Outlook, provided there is a mission need and the network environment meets the following criteria: - Both the website issuing the RSS feeds and the Outlook email client have an available network path to each other. - Neither the website issuing the RSS feeds nor the Outlook email client has a network path to the public Internet. An example of such an environment would be a closed lab or other deployed network where the requisite signoffs, artifacts, and network documentation demonstrate that the public Internet is not available to the Outlook client, preventing unauthorized RSS subscriptions being accessed by users of the Outlook client. If the environment meets the above stated criteria, this requirement is Not Applicable. For all environments where the Outlook email client has access to public Internet websites, RSS integration into Outlook is not permitted, and should be validated as follows: The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Turn off RSS feature" is set to "Enabled". When this policy setting is enabled, the RSS aggregation feature in Outlook is disabled. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\rss Criteria: If the REG_DWORD value for "Disable" is 1, this is not a finding.
Fix: F-46935r2_fix
NOTE: If the use of RSS feeds integrated into Outlook is a mission need, and the network environment is configured with the following criteria: 1. Both the website issuing the RSS feeds and the Outlook email client must have an available network path to each other. 2. Neither the website issuing the RSS feeds nor the Outlook email client has a network path to the public Internet. Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Turn off RSS feature" to "Enabled". For all environments where the Outlook email clients have access to public Internet websites, RSS integration into Outlook is not permitted, and should be configured as follows: ================================= Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Turn off RSS feature" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO231
- Vuln IDs
-
- V-17812
- Rule IDs
-
- SV-53897r1_rule
Checks: C-47922r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Use Unicode format when dragging e-mail message to file system" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\general Criteria: If the value MSGFormat is REG_DWORD = 0, this is not a finding.
Fix: F-46802r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Other -> Advanced "Use Unicode format when dragging e-mail message to file system" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO286
- Vuln IDs
-
- V-17944
- Rule IDs
-
- SV-54059r1_rule
Checks: C-47999r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Meeting Workspace "Disable user entries to server list" is set to "Enabled (Publish default, disallow others)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\meetings\profile Criteria: If the value ServerUI is REG_DWORD = 2, this is not a finding.
Fix: F-46939r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Meeting Workspace "Disable user entries to server list" to "Enabled (Publish default, disallow others)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO126
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-53862r1_rule
Checks: C-47903r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46766r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Add-on Management " to "Enabled" and 'outlook.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-53865r1_rule
Checks: C-47906r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46770r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and 'outlook.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO211
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-53866r1_rule
Checks: C-47907r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46771r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and 'outlook.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO132
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-53864r1_rule
Checks: C-47905r1_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46768r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and select 'outlook.exe'.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO124
- Vuln IDs
-
- V-26588
- Rule IDs
-
- SV-53858r1_rule
Checks: C-47902r2_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-46763r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2013 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and 'outlook.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO305
- Vuln IDs
-
- V-26625
- Rule IDs
-
- SV-54060r1_rule
Checks: C-48000r3_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Global Options -> Customize -> "Disable UI extending from documents and templates" is set to "Enabled" and "Disallow in Outlook" is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\common\toolbars\outlook Criteria: If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1, this is not a finding.
Fix: F-46940r3_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2013 -> Global Options -> Customize -> "Disable UI extending from documents and templates" to "Enabled". Select the policy option for "Disallow in Outlook".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO313
- Vuln IDs
-
- V-26632
- Rule IDs
-
- SV-54061r1_rule
Checks: C-48001r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Automatically download enclosures" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\rss Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-46941r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> RSS Feeds "Automatically download enclosures" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO344
- Vuln IDs
-
- V-26633
- Rule IDs
-
- SV-54067r1_rule
Checks: C-48007r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Mail Format -> Internet Formatting "Outlook Rich Text options" is "Enabled: Convert to Plain Text format". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value Message RTF Format is REG_DWORD = 1, this is not a finding.
Fix: F-46947r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Mail Format -> Internet Formatting "Outlook Rich Text options" to "Enabled: Convert to Plain Text format".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO314
- Vuln IDs
-
- V-26634
- Rule IDs
-
- SV-54062r1_rule
Checks: C-48002r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Mail Format -> Internet Formatting -> Message Format "Set message format" is "Enabled: Plain Text". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail Criteria: If the value EditorPreference is REG_DWORD = 65536 (dec), this is not a finding.
Fix: F-46942r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Mail Format -> Internet Formatting -> Message Format "Set message format" to "Enabled: Plain Text".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO315
- Vuln IDs
-
- V-26635
- Rule IDs
-
- SV-54063r1_rule
Checks: C-48003r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Prompt user to choose security settings if default settings fail" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value ForceDefaultProfile is REG_DWORD = 0, this is not a finding.
Fix: F-46943r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Prompt user to choose security settings if default settings fail" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO316
- Vuln IDs
-
- V-26636
- Rule IDs
-
- SV-54064r1_rule
Checks: C-48004r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Minimum encryption settings" is set to "Enabled: 168 bits". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value MinEncKey is REG_DWORD = 168, this is not a finding.
Fix: F-46944r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Minimum encryption settings" to "Enabled: 168 bits".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO317
- Vuln IDs
-
- V-26637
- Rule IDs
-
- SV-54065r1_rule
Checks: C-48005r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Replies or forwards to signed/encrypted messages are signed/encrypted" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value NoCheckOnSessionSecurity is REG_DWORD = 1, this is not a finding.
Fix: F-46945r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Replies or forwards to signed/encrypted messages are signed/encrypted" to "Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO320
- Vuln IDs
-
- V-26702
- Rule IDs
-
- SV-54066r1_rule
Checks: C-48006r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Do not check e-mail address against address of certificates being used" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security Criteria: If the value SupressNameChecks is REG_DWORD = 1, this is not a finding.
Fix: F-46946r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Cryptography "Do not check e-mail address against address of certificates being used" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO424
- Vuln IDs
-
- V-41492
- Rule IDs
-
- SV-54068r1_rule
Checks: C-48008r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> "Disable Weather Bar" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\outlook\options\calendar Criteria: If the value disableweather is REG_DWORD = 1, this is not a finding.
Fix: F-46948r1_fix
Set the policy User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> Preferences -> Calendar Options -> "Disable Weather Bar" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO425
- Vuln IDs
-
- V-41493
- Rule IDs
-
- SV-54069r1_rule
Checks: C-48009r1_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> "Internet and network path into hyperlinks" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\15.0\outlook\options\autoformat Criteria: If the value pgrfafo_25_1 is REG_DWORD = 0, this is not a finding.
Fix: F-46949r1_fix
Set the policy User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Outlook Options -> "Internet and network path into hyperlinks" must be set to "Disabled".