STIGQter STIGQter: STIG Summary: Microsoft Outlook 2016 Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

Retrieving of CRL data must be set for online action.

DISA Rule

SV-228457r508021_rule

Vulnerability Number

V-228457

Group Title

SRG-APP-000175

Rule Version

DTOO267

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" to "Enabled (When online always retrieve the CRL)".

Check Contents

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" is set to "Enabled (When online always retrieve the CRL)".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security

Criteria: If the value UseCRLChasing is REG_DWORD = 1, this is not a finding.

Vulnerability Number

V-228457

Documentable

False

Rule Version

DTOO267

Severity Override Guidance

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2016 -> Security -> Cryptography -> Signature Status dialog box "Retrieving CRLs (Certificate Revocation Lists)" is set to "Enabled (When online always retrieve the CRL)".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security

Criteria: If the value UseCRLChasing is REG_DWORD = 1, this is not a finding.

Check Content Reference

M

Target Key

4224

Comments