1.9.6.1.4 Ensure 'Do not allow Outlook object model scripts to run for shared folders' is set to Enabled

Information

This policy setting controls whether Outlook executes scripts associated with custom forms or folder home pages for shared folders.
If you enable this policy setting, Outlook cannot execute any scripts associated with shared folders, overriding any configuration changes on users' computers.
If you disable this policy setting, Outlook will automatically run any scripts associated with custom forms or folder home pages for shared folders.
If you do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled. The recommended state for this setting is: Enabled.

Rationale:

In Outlook, folders can be associated with custom forms or folder home pages that include scripts that access the Outlook object model. These scripts can add functionality to the folders and items contained within, but dangerous scripts can pose security risks.
By default, Outlook does not allow scripts included in custom forms or folder home pages for shared folders to execute. If this configuration is changed, users can inadvertently run dangerous scripts when using shared folders, which can put their computers or data at risk.

Solution

To implement the recommended configuration state, set the following Group Policy setting to Enabled.

User Configuration\Administrative Templates\Microsoft Outlook 2016\Outlook Options\Other\Advanced\Do not allow Outlook object model scripts to run for shared folders

Impact:

Enabling this setting enforces the default configuration in Outlook, and therefore is unlikely to cause usability issues for most users.

See Also

https://workbench.cisecurity.org/files/553

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-18(4)

Plugin: Windows

Control ID: 621189711bd173a0fda24a81098b4da8b03db88cffaed13567469f3de1b0ba74