STIGQter STIGQter: STIG Summary: Microsoft Outlook 2013 STIG Version: 1 Release: 13 Benchmark Date: 26 Oct 2018:

Hyperlinks in suspected phishing email messages must be disallowed.

DISA Rule

SV-54051r1_rule

Vulnerability Number

V-17613

Group Title

DTOO277 - Links in Email Messages

Rule Version

DTOO277

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".

Check Contents

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail

Criteria: If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.

Vulnerability Number

V-17613

Documentable

False

Rule Version

DTOO277

Severity Override Guidance

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security -> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\outlook\options\mail

Criteria: If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

2482

Comments