Microsoft Outlook 2016 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +58 −58
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 58
- V-228419 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-228420 Medium Enabling IE Bind to Object functionality must be present.
- V-228421 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-228422 Medium Navigation to URLs embedded in Office products must be blocked.
- V-228423 Medium Scripted Window Security must be enforced.
- V-228424 Medium Add-on Management functionality must be allowed.
- V-228425 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-228426 Medium File Downloads must be configured for proper restrictions.
- V-228427 Medium Protection from zone elevation must be enforced.
- V-228428 Medium ActiveX Installs must be configured for proper restriction.
- V-228429 Medium Publishing calendars to Office Online must be prevented.
- V-228430 Medium Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
- V-228431 Medium Level of calendar details that a user can publish must be restricted.
- V-228432 Medium Access restriction settings for published calendars must be configured.
- V-228433 Medium Outlook Object Model scripts must be disallowed to run for shared folders.
- V-228434 Medium Outlook Object Model scripts must be disallowed to run for public folders.
- V-228435 Medium ActiveX One-Off forms must be configured.
- V-228436 Medium The Add-In Trust Level must be configured.
- V-228437 Medium The remember password for internet e-mail accounts must be disabled.
- V-228438 Medium Users customizing attachment security settings must be prevented.
- V-228439 Medium Outlook Security Mode must be configured to use Group Policy settings.
- V-228440 Medium The ability to display level 1 attachments must be disallowed.
- V-228441 Medium Level 1 file extensions must be blocked and not removed.
- V-228442 Medium Level 2 file extensions must be blocked and not removed.
- V-228443 Medium Scripts in One-Off Outlook forms must be disallowed.
- V-228444 Medium Custom Outlook Object Model (OOM) action execution prompts must be configured.
- V-228445 Medium Object Model Prompt for programmatic email send behavior must be configured.
- V-228446 Medium Object Model Prompt behavior for programmatic address books must be configured.
- V-228447 Medium Object Model Prompt behavior for programmatic access of user address data must be configured.
- V-228448 Medium Object Model Prompt behavior for Meeting and Task Responses must be configured.
- V-228449 Medium Object Model Prompt behavior for the SaveAs method must be configured.
- V-228450 Medium Object Model Prompt behavior for accessing User Property Formula must be configured.
- V-228451 Medium Trusted add-ins behavior for email must be configured.
- V-228452 Medium S/Mime interoperability with external clients for message handling must be configured.
- V-228453 Medium Message formats must be set to use SMime.
- V-228454 Medium Run in FIPS compliant mode must be enforced.
- V-228455 Medium Send all signed messages as clear signed messages must be configured.
- V-228456 Medium Automatic sending s/Mime receipt requests must be disallowed.
- V-228457 Medium Retrieving of CRL data must be set for online action.
- V-228458 Medium External content and pictures in HTML email must be displayed.
- V-228459 Medium Automatic download content for email in Safe Senders list must be disallowed.
- V-228460 Medium Permit download of content from safe zones must be configured.
- V-228461 Medium IE Trusted Zones assumed trusted must be blocked.
- V-228462 Medium Internet with Safe Zones for Picture Download must be disabled.
- V-228463 Medium Intranet with Safe Zones for automatic picture downloads must be configured.
- V-228464 Medium Always warn on untrusted macros must be enforced.
- V-228465 Medium Hyperlinks in suspected phishing email messages must be disallowed.
- V-228466 Medium RPC encryption between Outlook and Exchange server must be enforced.
- V-228467 Medium Outlook must be configured to force authentication when connecting to an Exchange server.
- V-228468 Medium Disabling download full text of articles as HTML must be configured.
- V-228469 Medium Automatic download of Internet Calendar appointment attachments must be disallowed.
- V-228470 Medium Internet calendar integration in Outlook must be disabled.
- V-228471 Medium User Entries to Server List must be disallowed.
- V-228472 Medium Automatically downloading enclosures on RSS must be disallowed.
- V-228473 Medium Outlook must be configured not to prompt users to choose security settings if default settings fail.
- V-228474 Medium Outlook minimum encryption key length settings must be set.
- V-228475 Medium Replies or forwards to signed/encrypted messages must be signed/encrypted.
- V-228476 Medium Check e-mail addresses against addresses of certificates being used must be disallowed.
Removed rules 58
- V-71109 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
- V-71111 Medium Enabling IE Bind to Object functionality must be present.
- V-71113 Medium Saved from URL mark to assure Internet zone processing must be enforced.
- V-71115 Medium Navigation to URLs embedded in Office products must be blocked.
- V-71117 Medium Scripted Window Security must be enforced.
- V-71119 Medium Add-on Management functionality must be allowed.
- V-71121 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
- V-71123 Medium File Downloads must be configured for proper restrictions.
- V-71125 Medium Protection from zone elevation must be enforced.
- V-71127 Medium ActiveX Installs must be configured for proper restriction.
- V-71129 Medium Publishing calendars to Office Online must be prevented.
- V-71131 Medium Publishing to a Web Distributed and Authoring (DAV) server must be prevented.
- V-71133 Medium Level of calendar details that a user can publish must be restricted.
- V-71135 Medium Access restriction settings for published calendars must be configured.
- V-71145 Medium Outlook Object Model scripts must be disallowed to run for shared folders.
- V-71147 Medium Outlook Object Model scripts must be disallowed to run for public folders.
- V-71149 Medium ActiveX One-Off forms must be configured.
- V-71151 Medium The Add-In Trust Level must be configured.
- V-71153 Medium The remember password for internet e-mail accounts must be disabled.
- V-71155 Medium Users customizing attachment security settings must be prevented.
- V-71157 Medium Outlook Security Mode must be configured to use Group Policy settings.
- V-71159 Medium The ability to display level 1 attachments must be disallowed.
- V-71161 Medium Level 1 file extensions must be blocked and not removed.
- V-71163 Medium Level 2 file extensions must be blocked and not removed.
- V-71165 Medium Scripts in One-Off Outlook forms must be disallowed.
- V-71167 Medium Custom Outlook Object Model (OOM) action execution prompts must be configured.
- V-71169 Medium Object Model Prompt for programmatic email send behavior must be configured.
- V-71171 Medium Object Model Prompt behavior for programmatic address books must be configured.
- V-71173 Medium Object Model Prompt behavior for programmatic access of user address data must be configured.
- V-71175 Medium Object Model Prompt behavior for Meeting and Task Responses must be configured.
- V-71177 Medium Object Model Prompt behavior for the SaveAs method must be configured.
- V-71179 Medium Object Model Prompt behavior for accessing User Property Formula must be configured.
- V-71193 Medium Trusted add-ins behavior for email must be configured.
- V-71195 Medium S/Mime interoperability with external clients for message handling must be configured.
- V-71227 Medium Message formats must be set to use SMime.
- V-71229 Medium Run in FIPS compliant mode must be enforced.
- V-71231 Medium Send all signed messages as clear signed messages must be configured.
- V-71233 Medium Automatic sending s/Mime receipt requests must be disallowed.
- V-71235 Medium Retrieving of CRL data must be set for online action.
- V-71237 Medium External content and pictures in HTML email must be displayed.
- V-71239 Medium Automatic download content for email in Safe Senders list must be disallowed.
- V-71241 Medium Permit download of content from safe zones must be configured.
- V-71243 Medium IE Trusted Zones assumed trusted must be blocked.
- V-71245 Medium Internet with Safe Zones for Picture Download must be disabled.
- V-71247 Medium Intranet with Safe Zones for automatic picture downloads must be configured.
- V-71249 Medium Always warn on untrusted macros must be enforced.
- V-71251 Medium Hyperlinks in suspected phishing email messages must be disallowed.
- V-71253 Medium RPC encryption between Outlook and Exchange server must be enforced.
- V-71255 Medium Outlook must be configured to force authentication when connecting to an Exchange server.
- V-71259 Medium Disabling download full text of articles as HTML must be configured.
- V-71261 Medium Automatic download of Internet Calendar appointment attachments must be disallowed.
- V-71263 Medium Internet calendar integration in Outlook must be disabled.
- V-71265 Medium User Entries to Server List must be disallowed.
- V-71267 Medium Automatically downloading enclosures on RSS must be disallowed.
- V-71271 Medium Outlook must be configured not to prompt users to choose security settings if default settings fail.
- V-71273 Medium Outlook minimum encryption key length settings must be set.
- V-71275 Medium Replies or forwards to signed/encrypted messages must be signed/encrypted.
- V-71277 Medium Check e-mail addresses against addresses of certificates being used must be disallowed.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO104
- Vuln IDs
-
- V-228419
- V-71109
- Rule IDs
-
- SV-228419r508021_rule
- SV-85733
Checks: C-30652r497579_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30637r497580_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Disable user name and password" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO111
- Vuln IDs
-
- V-228420
- V-71111
- Rule IDs
-
- SV-228420r508021_rule
- SV-85735
Checks: C-30653r497582_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30638r497583_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Bind to Object" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO117
- Vuln IDs
-
- V-228421
- V-71113
- Rule IDs
-
- SV-228421r508021_rule
- SV-85737
Checks: C-30654r497585_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30639r497586_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Saved from URL" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO123
- Vuln IDs
-
- V-228422
- V-71115
- Rule IDs
-
- SV-228422r508021_rule
- SV-85739
Checks: C-30655r497588_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30640r497589_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Navigate URL" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO124
- Vuln IDs
-
- V-228423
- V-71117
- Rule IDs
-
- SV-228423r508021_rule
- SV-85741
Checks: C-30656r497591_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30641r497592_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Scripted Window Security Restrictions" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO126
- Vuln IDs
-
- V-228424
- V-71119
- Rule IDs
-
- SV-228424r508021_rule
- SV-85743
Checks: C-30657r497594_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30642r497595_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Add-on Management" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO129
- Vuln IDs
-
- V-228425
- V-71121
- Rule IDs
-
- SV-228425r508021_rule
- SV-85745
Checks: C-30658r497597_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30643r497598_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Block popups" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO132
- Vuln IDs
-
- V-228426
- V-71123
- Rule IDs
-
- SV-228426r508021_rule
- SV-85747
Checks: C-30659r497600_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value of outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30644r497601_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict File Download" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTOO209
- Vuln IDs
-
- V-228427
- V-71125
- Rule IDs
-
- SV-228427r508021_rule
- SV-85749
Checks: C-30660r497603_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30645r497604_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Protection From Zone Elevation" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO211
- Vuln IDs
-
- V-228428
- V-71127
- Rule IDs
-
- SV-228428r508021_rule
- SV-85751
Checks: C-30661r497606_chk
Verify the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" is set to "Enabled" and 'outlook.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value outlook.exe is REG_DWORD = 1, this is not a finding.
Fix: F-30646r497607_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2016 (Machine) -> Security Settings -> IE Security "Restrict ActiveX Install" to "Enabled" and place a check in the 'outlook.exe' check box.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO216
- Vuln IDs
-
- V-228429
- V-71129
- Rule IDs
-
- SV-228429r508021_rule
- SV-85753
Checks: C-30662r497609_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to Office.com" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\pubcal Criteria: If the value DisableOfficeOnline is REG_DWORD = 1, this is not a finding.
Fix: F-30647r497610_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to Office.com" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO217
- Vuln IDs
-
- V-228430
- V-71131
- Rule IDs
-
- SV-228430r508021_rule
- SV-85755
Checks: C-30663r497612_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to a DAV server" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\pubcal Criteria: If the value DisableDav is REG_DWORD = 1, this is not a finding.
Fix: F-30648r497613_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Prevent publishing to a DAV server" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO218
- Vuln IDs
-
- V-228431
- V-71133
- Rule IDs
-
- SV-228431r508021_rule
- SV-85757
Checks: C-30664r497615_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict level of calendar details users can publish" is set to "Enabled (Disables 'Full details' and 'Limited details')". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\pubcal Criteria: If the value PublishCalendarDetailsPolicy is REG_DWORD = 4000 (hex) or 16384 (Decimal), this is not a finding.
Fix: F-30649r497828_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Restrict level of calendar details users can publish" to "Enabled (Disables 'Full details' and 'Limited details')".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO219
- Vuln IDs
-
- V-228432
- V-71135
- Rule IDs
-
- SV-228432r508021_rule
- SV-85759
Checks: C-30665r497618_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Access to published calendars" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\pubcal Criteria: If the value RestrictedAccessOnly is REG_DWORD = 1, this is not a finding.
Fix: F-30650r497619_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Preferences -> Calendar Options -> Office.com Sharing Service "Access to published calendars" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO232
- Vuln IDs
-
- V-228433
- V-71145
- Rule IDs
-
- SV-228433r508021_rule
- SV-85769
Checks: C-30666r497621_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for shared folders" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value SharedFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-30651r497622_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for shared folders" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO233
- Vuln IDs
-
- V-228434
- V-71147
- Rule IDs
-
- SV-228434r508021_rule
- SV-85771
Checks: C-30667r497624_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for public folders" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PublicFolderScript is REG_DWORD = 0, this is not a finding.
Fix: F-30652r497625_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Outlook Options -> Other -> Advanced "Do not allow Outlook object model scripts to run for public folders" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO234
- Vuln IDs
-
- V-228435
- V-71149
- Rule IDs
-
- SV-228435r508021_rule
- SV-85773
Checks: C-30668r497627_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Allow Active X One Off Forms" is set to "Enabled: Load only Outlook Controls". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value AllowActiveXOneOffForms is REG_DWORD = 0, this is not a finding.
Fix: F-30653r497628_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Allow Active X One Off Forms" to "Enabled: Load only Outlook Controls".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO236
- Vuln IDs
-
- V-228436
- V-71151
- Rule IDs
-
- SV-228436r508021_rule
- SV-85775
Checks: C-30669r497630_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Configure Add-In Trust Level" is set to "Enabled (Trust all loaded and installed COM addins)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value AddinTrust is REG_DWORD = 1, this is not a finding.
Fix: F-30654r497631_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Configure Add-In Trust Level" to "Enabled (Trust all loaded and installed COM addins)".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- DTOO237
- Vuln IDs
-
- V-228437
- V-71153
- Rule IDs
-
- SV-228437r508021_rule
- SV-85777
Checks: C-30670r497633_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Disable 'Remember password' for Internet e-mail accounts" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value EnableRememberPwd is REG_DWORD = 0, this is not a finding.
Fix: F-30655r497634_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Disable 'Remember password' for Internet e-mail accounts" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO238
- Vuln IDs
-
- V-228438
- V-71155
- Rule IDs
-
- SV-228438r508021_rule
- SV-85779
Checks: C-30671r497636_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Prevent users from customizing attachment security settings" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.
Fix: F-30656r497637_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Prevent users from customizing attachment security settings" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO239
- Vuln IDs
-
- V-228439
- V-71157
- Rule IDs
-
- SV-228439r508021_rule
- SV-85781
Checks: C-30672r497639_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings "Outlook Security Mode" is set to "Enabled (Use Outlook Security Group Policy)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value AdminSecurityMode is REG_DWORD = 3, this is not a finding.
Fix: F-30657r497640_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings "Outlook Security Mode" to "Enabled (Use Outlook Security Group Policy)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO240
- Vuln IDs
-
- V-228440
- V-71159
- Rule IDs
-
- SV-228440r508021_rule
- SV-85783
Checks: C-30673r497642_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Attachment Security "Display Level 1 attachments" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-30658r497643_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Attachment Security "Display Level 1 attachments" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO244
- Vuln IDs
-
- V-228441
- V-71161
- Rule IDs
-
- SV-228441r508021_rule
- SV-85785
Checks: C-30674r497645_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 1" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security\FileExtensionsRemoveLevel1 Criteria: If the registry key exists, this is a finding.
Fix: F-30659r497646_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 1" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO245
- Vuln IDs
-
- V-228442
- V-71163
- Rule IDs
-
- SV-228442r508021_rule
- SV-85787
Checks: C-30675r497648_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 2" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security\FileExtensionsRemoveLevel2 Criteria: If the registry key exists, this is a finding.
Fix: F-30660r497649_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Attachment Security "Remove file extensions blocked as Level 2" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTOO246
- Vuln IDs
-
- V-228443
- V-71165
- Rule IDs
-
- SV-228443r508021_rule
- SV-85789
Checks: C-30676r497651_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Custom Form Security "Allow scripts in one-off Outlook forms" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix: F-30661r497652_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Custom Form Security "Allow scripts in one-off Outlook forms" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO247
- Vuln IDs
-
- V-228444
- V-71167
- Rule IDs
-
- SV-228444r508021_rule
- SV-85791
Checks: C-30677r497654_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Custom Form Security "Set Outlook object model Custom Actions execution prompt" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PromptOOMCustomAction is REG_DWORD = 0, this is not a finding.
Fix: F-30662r497655_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Custom Form Security "Set Outlook object model Custom Actions execution prompt" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO249
- Vuln IDs
-
- V-228445
- V-71169
- Rule IDs
-
- SV-228445r508021_rule
- SV-85793
Checks: C-30678r497657_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when sending mail" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PromptOOMSend is REG_DWORD = 0, this is not a finding.
Fix: F-30663r497658_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when sending mail" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO250
- Vuln IDs
-
- V-228446
- V-71171
- Rule IDs
-
- SV-228446r508021_rule
- SV-85795
Checks: C-30679r497660_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when accessing an address book" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PromptOOMAddressBookAccess is REG_DWORD = 0, this is not a finding.
Fix: F-30664r497830_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when accessing an address book" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO251
- Vuln IDs
-
- V-228447
- V-71173
- Rule IDs
-
- SV-228447r508021_rule
- SV-85797
Checks: C-30680r497663_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when reading address information" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PromptOOMAddressInformationAccess is REG_DWORD = 0, this is not a finding.
Fix: F-30665r497832_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when reading address information" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO252
- Vuln IDs
-
- V-228448
- V-71175
- Rule IDs
-
- SV-228448r508021_rule
- SV-85799
Checks: C-30681r497666_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when responding to meeting and task requests" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PromptOOMMeetingTaskRequestResponse is REG_DWORD = 0, this is not a finding.
Fix: F-30666r497834_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when responding to meeting and task requests" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO253
- Vuln IDs
-
- V-228449
- V-71177
- Rule IDs
-
- SV-228449r508021_rule
- SV-85801
Checks: C-30682r497669_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when executing Save As" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PromptOOMSaveAs is REG_DWORD = 0, this is not a finding.
Fix: F-30667r497836_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt when executing Save As" to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- DTOO254
- Vuln IDs
-
- V-228450
- V-71179
- Rule IDs
-
- SV-228450r508021_rule
- SV-85803
Checks: C-30683r497672_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" is set to "Enabled (Automatically Deny)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-30668r497838_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security "Configure Outlook object model prompt When accessing the Formula property of a UserProperty object" to "Enabled (Automatically Deny)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO256
- Vuln IDs
-
- V-228451
- V-71193
- Rule IDs
-
- SV-228451r508021_rule
- SV-85817
Checks: C-30684r497675_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins "Configure trusted add-ins" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Outlook\security Criteria: If the value trustedaddins does not exist, this is not a finding. If the value trustedaddins exists, but with no entries, this is not a finding. If the value trustedaddins exists, with entries, this is a finding. In some reported configurations, the value remains after disabling the setting but the value is empty.
Fix: F-30669r497676_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Security Form Settings -> Programmatic Security -> Trusted Add-ins "Configure trusted add-ins" to "Disabled".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- DTOO257
- Vuln IDs
-
- V-228452
- V-71195
- Rule IDs
-
- SV-228452r508021_rule
- SV-85819
Checks: C-30685r497678_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "S/MIME interoperability with external clients" is set to "Enabled (Handle internally)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value ExternalSMime is REG_DWORD = 0, this is not a finding.
Fix: F-30670r497679_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "S/MIME interoperability with external clients" to "Enabled (Handle internally)".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- DTOO260
- Vuln IDs
-
- V-228453
- V-71227
- Rule IDs
-
- SV-228453r508021_rule
- SV-85851
Checks: C-30686r497681_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Message Formats" is set to "Enabled (S\MIME)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value MsgFormats is REG_DWORD = 1, this is not a finding.
Fix: F-30671r497682_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Message Formats" to "Enabled (S\MIME)".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- DTOO262
- Vuln IDs
-
- V-228454
- V-71229
- Rule IDs
-
- SV-228454r559729_rule
- SV-85853
Checks: C-30687r497684_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Run in FIPS compliant mode" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value FIPSMode is REG_DWORD = 1, this is not a finding.
Fix: F-30672r497685_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Run in FIPS compliant mode" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO264
- Vuln IDs
-
- V-228455
- V-71231
- Rule IDs
-
- SV-228455r508021_rule
- SV-85855
Checks: C-30688r497687_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Send all signed messages as clear signed messages" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value ClearSign is REG_DWORD = 1, this is not a finding.
Fix: F-30673r497688_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Send all signed messages as clear signed messages" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO266
- Vuln IDs
-
- V-228456
- V-71233
- Rule IDs
-
- SV-228456r508021_rule
- SV-85857
Checks: C-30689r497690_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "S/MIME receipt requests behavior" is set to "Enabled (Never send S\MIME receipts)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value RespondToReceiptRequests is REG_DWORD = 2, this is not a finding.
Fix: F-30674r497691_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "S/MIME receipt requests behavior" to "Enabled (Never send S\MIME receipts)".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTOO267
- Vuln IDs
-
- V-228457
- V-71235
- Rule IDs
-
- SV-228457r508021_rule
- SV-85859
Checks: C-30690r497693_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" is set to "Enabled (When online always retrieve the CRL)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value UseCRLChasing is REG_DWORD = 1, this is not a finding.
Fix: F-30675r497840_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" to "Enabled (When online always retrieve the CRL)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO270
- Vuln IDs
-
- V-228458
- V-71237
- Rule IDs
-
- SV-228458r508021_rule
- SV-85861
Checks: C-30691r497696_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Automatic Picture Download Settings "Display pictures and external content in HTML e-mail" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail Criteria: If the value BlockExtContent is REG_DWORD = 1, this is not a finding.
Fix: F-30676r497697_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Display pictures and external content in HTML e-mail" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO271
- Vuln IDs
-
- V-228459
- V-71239
- Rule IDs
-
- SV-228459r508021_rule
- SV-85863
Checks: C-30692r497699_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail Criteria: If the value UnblockSpecificSenders is REG_DWORD = 0, this is not a finding.
Fix: F-30677r497842_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO272
- Vuln IDs
-
- V-228460
- V-71241
- Rule IDs
-
- SV-228460r508021_rule
- SV-85865
Checks: C-30693r497702_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Do not permit download of content from safe zones" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail Criteria: If the value UnblockSafeZone is REG_DWORD = 1, this is not a finding.
Fix: F-30678r497703_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Do not permit download of content from safe zones" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO273
- Vuln IDs
-
- V-228461
- V-71243
- Rule IDs
-
- SV-228461r508021_rule
- SV-85867
Checks: C-30694r497705_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Block Trusted Zones" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail Criteria: If the value TrustedZone is REG_DWORD = 0, this is not a finding.
Fix: F-30679r497706_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Block Trusted Zones" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO274
- Vuln IDs
-
- V-228462
- V-71245
- Rule IDs
-
- SV-228462r508021_rule
- SV-85869
Checks: C-30695r497708_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Include Internet in Safe Zones for Automatic Picture Download" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail Criteria: If the value Internet is REG_DWORD = 0, this is not a finding.
Fix: F-30680r497709_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Include Internet in Safe Zones for Automatic Picture Download" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO275
- Vuln IDs
-
- V-228463
- V-71247
- Rule IDs
-
- SV-228463r508021_rule
- SV-85871
Checks: C-30696r497711_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Include Intranet in Safe Zones for Automatic Picture Download" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail Criteria: If the value Intranet is REG_DWORD = 0, this is not a finding.
Fix: F-30681r497712_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Automatic Picture Download Settings "Include Intranet in Safe Zones for Automatic Picture Download" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- DTOO276
- Vuln IDs
-
- V-228464
- V-71249
- Rule IDs
-
- SV-228464r508021_rule
- SV-85873
Checks: C-30697r497714_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Trust Center "Security setting for macros" is set to "Enabled (Warn for signed, disable unsigned)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value Level is REG_DWORD = 3, this is not a finding.
Fix: F-30682r497715_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Trust Center "Security setting for macros" to "Enabled (Warn for signed, disable unsigned)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO277
- Vuln IDs
-
- V-228465
- V-71251
- Rule IDs
-
- SV-228465r508021_rule
- SV-85875
Checks: C-30698r497717_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail Criteria: If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-30683r497718_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- DTOO279
- Vuln IDs
-
- V-228466
- V-71253
- Rule IDs
-
- SV-228466r508021_rule
- SV-85877
Checks: C-30699r497720_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Exchange "Enable RPC encryption" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\rpc Criteria: If the value EnableRPCEncryption is REG_DWORD = 1, this is not a finding.
Fix: F-30684r497721_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Exchange "Enable RPC encryption" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- DTOO280
- Vuln IDs
-
- V-228467
- V-71255
- Rule IDs
-
- SV-228467r508021_rule
- SV-85879
Checks: C-30700r497723_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Exchange "Authentication with Exchange Server" is set to "Enabled (Kerberos Password Authentication)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value AuthenticationService is REG_DWORD = 16 (decimal) or 10 (hex), this is not a finding.
Fix: F-30685r497724_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Exchange "Authentication with Exchange Server" to "Enabled (Kerberos Password Authentication)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO283
- Vuln IDs
-
- V-228468
- V-71259
- Rule IDs
-
- SV-228468r508021_rule
- SV-85883
Checks: C-30701r497726_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> RSS Feeds "Download full text of articles as HTML attachments" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\rss Criteria: If the value EnableFullTextHTML is REG_DWORD = 0, this is not a finding.
Fix: F-30686r497727_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> RSS Feeds "Download full text of articles as HTML attachments" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- DTOO284
- Vuln IDs
-
- V-228469
- V-71261
- Rule IDs
-
- SV-228469r508021_rule
- SV-85885
Checks: C-30702r497729_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Internet Calendars "Automatically download attachments" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\webcal Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-30687r497730_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Internet Calendars "Automatically download attachments" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO285
- Vuln IDs
-
- V-228470
- V-71263
- Rule IDs
-
- SV-228470r508021_rule
- SV-85887
Checks: C-30703r497732_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Internet Calendars "Do not include Internet Calendar integration in Outlook" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\webcal Criteria: If the value Disable is REG_DWORD = 1, this is not a finding.
Fix: F-30688r497733_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> Internet Calendars "Do not include Internet Calendar integration in Outlook" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO286
- Vuln IDs
-
- V-228471
- V-71265
- Rule IDs
-
- SV-228471r508021_rule
- SV-85889
Checks: C-30704r497735_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Meeting Workspace "Disable user entries to server list" is set to "Enabled (Publish default, disallow others)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\meetings\profile Criteria: If the value ServerUI is REG_DWORD = 2, this is not a finding.
Fix: F-30689r497736_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Meeting Workspace "Disable user entries to server list" to "Enabled (Publish default, disallow others)".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTOO313
- Vuln IDs
-
- V-228472
- V-71267
- Rule IDs
-
- SV-228472r508021_rule
- SV-85891
Checks: C-30705r497738_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> RSS Feeds "Automatically download enclosures" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\rss Criteria: If the value EnableAttachments is REG_DWORD = 0, this is not a finding.
Fix: F-30690r497739_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Account Settings -> RSS Feeds "Automatically download enclosures" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO315
- Vuln IDs
-
- V-228473
- V-71271
- Rule IDs
-
- SV-228473r508021_rule
- SV-85895
Checks: C-30706r497741_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Prompt user to choose security settings if default settings fail" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value ForceDefaultProfile is REG_DWORD = 0, this is not a finding.
Fix: F-30691r497742_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security "Prompt user to choose security settings if default settings fail" to "Disabled".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- DTOO316
- Vuln IDs
-
- V-228474
- V-71273
- Rule IDs
-
- SV-228474r508021_rule
- SV-85897
Checks: C-30707r497744_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Minimum encryption settings" is set to "Enabled: 168 bits". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value MinEncKey is REG_DWORD = a8 (hex) or 168 (decimal), this is not a finding.
Fix: F-30692r497745_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Minimum encryption settings" to "Enabled: 168 bits".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO317
- Vuln IDs
-
- V-228475
- V-71275
- Rule IDs
-
- SV-228475r508021_rule
- SV-85899
Checks: C-30708r497747_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Replies or forwards to signed/encrypted messages are signed/encrypted" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value NoCheckOnSessionSecurity is REG_DWORD = 1, this is not a finding.
Fix: F-30693r497748_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Replies or forwards to signed/encrypted messages are signed/encrypted" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTOO320
- Vuln IDs
-
- V-228476
- V-71277
- Rule IDs
-
- SV-228476r508021_rule
- SV-85901
Checks: C-30709r497750_chk
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Do not check e-mail address against address of certificates being used" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security Criteria: If the value SupressNameChecks is REG_DWORD = 1, this is not a finding.
Fix: F-30694r497751_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography "Do not check e-mail address against address of certificates being used" to "Enabled".