Check: DTOO246 - Outlook
Microsoft Outlook 2010 STIG:
DTOO246 - Outlook
(in versions v1 r13 through v1 r12)
Title
Scripts in One-Off Outlook forms must be disallowed. (Cat II impact)
Discussion
Malicious code can be included within Outlook forms, and such code could be executed when users open the form. By default, Outlook does not run scripts in forms in which the script and the layout are contained within the message.
Check Content
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security “Allow scripts in one-off Outlook forms” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix Text
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Security Form Settings -> Custom Form Security “Allow scripts in one-off Outlook forms” to “Disabled”.
Additional Identifiers
Rule ID: SV-33586r1_rule
Vulnerability ID: V-17562
Group Title: DTOO246 - Scripts in One-Off Forms
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001170 |
The information system prevents the automatic execution of mobile code in organization-defined software applications. |
Controls
Number | Title |
---|---|
SC-18 (4) |
Prevent Automatic Execution |