Item Search

NameAudit NamePluginCategory
ARDC-CL-000005 - Adobe Reader DC must enable Enhanced Security in a Standalone Application.DISA STIG Adobe Acrobat Reader DC Classic Track v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ARDC-CN-000010 - Adobe Reader DC must enable Enhanced Security in a Browser.DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000130 - Java software installed on a production IIS 10.0 web server must be limited to .class files and the Java Virtual Machine.DISA IIS 10.0 Server v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000130 - Java software installed on a production IIS 10.0 web server must be limited to .class files and the Java Virtual Machine.DISA IIS 10.0 Server v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SV-000130 - Java software installed on a production IIS 8.5 web server must be limited to .class files and the Java Virtual Machine.DISA IIS 8.5 Server v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000008 - The Juniper Networks SRX Series Gateway IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000009 - The Juniper Networks SRX Series Gateway IDPS must block any prohibited mobile code at the enclave boundary when it is detected.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

O365-AC-000004 - Allowing Trusted Locations on the network must be disabled in Access.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000003 - The Office client must be prevented from polling the SharePoint Server for published links.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000005 - Open/save of dBase III / IV format files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000006 - Open/save of Dif and Sylk format files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000009 - Open/save of Excel 3 macrosheets and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000011 - Open/save of Excel 4 macrosheets and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000013 - Open/save of Excel 4 worksheets must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000014 - Open/save of Excel 95 workbooks must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000017 - Open/save of Web pages and Excel 2003 XML spreadsheets must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000026 - WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000030 - Untrusted database files must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000031 - Files from Internet zone must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000012 - The warning about invalid digital signatures must be enabled to warn Outlook users.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000015 - The ability to demote attachments from Level 2 to Level 1 must be disabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000016 - The display of Level 1 attachments must be disabled in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000017 - Level 1 file attachments must be blocked from being delivered.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000018 - Level 2 file attachments must be blocked from being delivered.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000028 - The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000003 - Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000004 - The default file block behavior must be set to not open blocked files in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000009 - Files downloaded from the Internet must be opened in Protected view in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000010 - PowerPoint attachments opened from Outlook must be in Protected View.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000011 - Files in unsafe locations must be opened in Protected view in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PU-000001 - Publisher must be configured to prompt the user when another application programmatically opens a macro.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000004 - Visio 2000-2002 Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000005 - Visio 2003-2010 Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000006 - Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000003 - Files downloaded from the Internet must be opened in Protected view in Word.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000005 - If file validation fails, files must be opened in Protected view in Word with ability to edit disabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000006 - Word attachments opened from Outlook must be in Protected View.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000007 - The default file block behavior must be set to not open blocked files in Word.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000011 - Open/Save of Word 2007 and later binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000014 - Open/Save of Word 97 binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000265 - OHS utilizing mobile code must meet DoD-defined mobile code requirements.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000020 - The Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary - antivirus rulesDISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000020 - The Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary - security rulesDISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000031 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Severe - EnabledDISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000040 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level High - 4>2DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000040 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level High - EnabledDISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000041 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Medium - 2>2DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000041 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Medium - EnabledDISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000042 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Low - 1>2DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000042 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Low - EnabledDISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION