DTOO255 - Outlook - Set the Object Model Prompt behavior for programmatic access of the UserProperties.Find Method.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If an untrusted application accesses address information, the application could gain access to sensitive data and potentially change that data.
By default, when an untrusted application attempts to access address information using the UserProperties.Find method, Outlook 2007 relies on the setting configured in the 'Programmatic Access' section of the Trust Center. This setting determines whether Outlook will warn users about programmatic access attempts-
- Only when antivirus software is out of date or not running (the default setting)
- Every time
- Not at all
If the 'Not at all' option is selected, Outlook will silently grant programmatic access to any program that requests it, which could allow a malicious program to gain access to sensitive information.
Note This described default functionality assumes that you have not followed the recommendation to enable the 'Outlook Security Mode' Group Policy setting to ensure that Outlook security settings are configured by Group Policy. If Group Policy security settings are used for Outlook, the 'Programmatic Access' section of the Trust Center is not used. In this situation, the default is to prompt users based on computer security, which is the equivalent of the 'Only when antivirus software is out of date or not running' option in the Trust Center, and the user experience is not affected.

Solution

The policy value for User Configuration -> Administrative Templates -> Microsoft Office Outlook 2007 -> Security -> Security Form Settings -> Programmatic Security 'Configure Outlook object model prompt when accessing address information via UserProperties.Find' will be set to 'Enabled (Automatically Deny)'.

See Also

http://iase.disa.mil/stigs/app_security/office_auto/u_microsoft_office2007_v4r9_stig_20121026.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, Rule-ID|SV-18673r2_rule, STIG-ID|DTOO255, Vuln-ID|V-17567

Plugin: Windows

Control ID: 6a6ff40152ae2ad13c1c0eee12a930eb7a96b94b1ba8970cf97a829187ce149a