Configure Outlook object model prompt when reading address information

Information

This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the ''To:'' field, using the Outlook object model. This includes COM add-ins, from 3rd parties and Microsoft, one example is Azure Information Protection which can access the Address Book programmatically. \n If you enable this policy setting, you can choose from four different options when an untrusted program attempts to access a recipient field using the Outlook object model: \n - Prompt user. The user will be prompted to approve every access attempt. \n - Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended. \n - Automatically deny. Outlook will automatically deny programmatic access requests from any program. \n - Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. This is the default configuration. \n If you disable or do not configure this policy setting, when an untrusted application attempts to access recipient fields, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center.

Solution

Policy Path: Microsoft Outlook 2016\Security\Security Form Settings\Programmatic Security
Policy Setting Name: Configure Outlook object model prompt when reading address information

See Also

https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-m365-apps-for-enterprise-v2312/ba-p/4009591

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b.

Plugin: Windows

Control ID: caafb3ff77da707e305b4293c8433100b4819daaf49bf44c38677cfeef8f3697