STIGQter STIGQter: STIG Summary: Microsoft Outlook 2013 STIG Version: 1 Release: 13 Benchmark Date: 26 Oct 2018:

Outlook must be configured to force authentication when connecting to an Exchange server.

DISA Rule

SV-54053r1_rule

Vulnerability Number

V-17734

Group Title

DTOO280 - Authentication w/Exchange Svr

Rule Version

DTOO280

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Exchange "Authentication with Exchange Server" to "Enabled (Kerberos/NTLM Password Authentication)".

Check Contents

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Exchange "Authentication with Exchange Server" is set to "Enabled (Kerberos/NTLM Password Authentication)".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security

Criteria: If the value AuthenticationService is REG_DWORD = 9, this is not a finding.

Vulnerability Number

V-17734

Documentable

False

Rule Version

DTOO280

Severity Override Guidance

Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Account Settings -> Exchange "Authentication with Exchange Server" is set to "Enabled (Kerberos/NTLM Password Authentication)".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security

Criteria: If the value AuthenticationService is REG_DWORD = 9, this is not a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

2482

Comments