1. Home
  2. Security Hardening
  3. CIS MS Office Outlook 2010 V1.0.0
  4. Set ‘Indicate a missing root certificate as a(n):’ to ‘Enabled:Warning’

Set ‘Indicate a missing root certificate as a(n):’ to ‘Enabled:Warning’

Details

This policy setting controls how Outlook functions when a root certificate is missing. If you

enable this policy setting, you can choose from three options that determine how Outlook

functions when a CRL is missing. – Neither Error nor Warning. This option displays neither

an error nor a warning, and enforces the default configuration in Outlook. – Warning. This

option ensures that Outlook displays a warning message when a CRL is missing. – Error.

This option ensures that Outlook displays an error message when a CRL is missing. If you

disable or do not configure this policy setting, users are not prompted with a warning or an

error when a root certificate cannot be located. The recommended state for this setting is-

Enabled-Warning.

*Rationale*

When Outlook 2010 accesses a certificate, it validates that it can trust the certificate by

examining the root certificate of the issuing CA. If the root certificate can be trusted, then

certificates issued by the CA can also be trusted. If Outlook cannot find the root certificate,

it cannot validate that any certificates issued by that CA can be trusted. An attacker may

compromise a root certificate and then remove the certificate in an attempt to conceal the

attack. By default, users are not prompted with a warning or an error when a root

certificate cannot be located.

Solution

To implement the recommended configuration state, set the following Group Policy setting
to Enabled.

User ConfigurationAdministrative TemplatesMicrosoft Outlook
2010SecurityCryptographySignature Status dialog boxMissing root
certificatesMissing root certificates

Then set the Indicate a missing root certificate as a(n)- option to Warning.

Impact-Enabling this setting will prevent Outlook 2010 users from using certificates when the
appropriate root certificate is not available to verify them, which could increase desktop
support requests.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles