1.13.3.3.5 Ensure 'Configure Outlook object model prompt when reading address information:' is set to Enabled:Automatically Deny

Information

This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the ''To:'' field, using the Outlook object model.

If you enable this policy setting, you can choose from four different options when an untrusted program attempts to access a recipient field using the Outlook object model:

- Prompt user. The user will be prompted to approve every access attempt.

- Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended.

- Automatically deny. Outlook will automatically deny programmatic access requests from any program.

- Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. This is the default configuration.

If you disable or do not configure this policy setting, when an untrusted application attempts to access recipient fields, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center. The recommended state for this setting is: Enabled:Automatically Deny.

Rationale:

If an untrusted application accesses the recipient fields, the application could gain access to sensitive data and potentially change that data. This could result in mail being sent to the wrong party.

By default, when an untrusted application attempts to access recipient fields, Outlook relies on the setting configured in the 'Programmatic Access' section of the Trust Center. This setting determines whether Outlook will warn users about programmatic access attempts:

* Only when antivirus software is out of date or not running (the default setting)
* Every time
* Not at all

If the 'Not at all' option is selected, Outlook will silently grant programmatic access to any program that requests it, which could allow a malicious program to gain access to sensitive information.

Note: This described default functionality assumes that you have not followed the recommendation to enable the 'Outlook Security Mode' Group Policy setting to ensure that Outlook security settings are configured by Group Policy. If Group Policy security settings are used for Outlook, the 'Programmatic Access' section of the Trust Center is not used. In this situation, the default is to prompt users based on computer security, which is the equivalent of the 'Only when antivirus software is out of date or not running' option in the Trust Center, and the user experience is not affected.

Solution

To implement the recommended configuration state, set the following Group Policy setting to Enabled.

User Configuration\Administrative Templates\Microsoft Outlook 2013\Security\Security Form Settings\Programmatic Security\Configure Outlook object model prompt when reading address information

Then set the Configure Outlook object model prompt when reading address information: Guard behavior: option to Automatically Deny.

Impact:

Enabling this setting and selecting Prompt user based on computer security enforces the default configuration in Outlook, and therefore is unlikely to cause usability issues for most users.

Important: For this setting to apply, you must also enable the 'Outlook Security Mode' setting in User Configuration\Administrative Templates\Classic Administrative Templates (ADM)\Microsoft Office Outlook <version>\Security\Security Form Settings\Microsoft Office Outlook Security and select Use Outlook Security Group Policy from the drop-down list.

See Also

https://workbench.cisecurity.org/files/552

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b.

Plugin: Windows

Control ID: ac76941d198145406095ca4be7bd45bab182431bce247c7238bfc468c8b7eef5