Item Search

NameAudit NamePluginCategory
DTAM021 - McAfee VirusScan On-Delivery Email Scan Policies must be configured to enable on-delivery email scanning.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTAM150 - McAfee VirusScan Access Protection: Anti-Virus Standard Protection must be set to prevent mass mailing worms from sending mail.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBC-0006 - Extensions that are approved for use must be allowlisted.DISA STIG Google Chrome v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBC-0065 - URLs must be allowlisted for Autoplay use.DISA STIG Google Chrome v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI024-IE11 - The Initialize and script ActiveX controls not marked as safe property must be disallowed (Internet zone).DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI350-IE11 - Software must be disallowed to run or install with invalid signatures.DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI830-IE11 - ActiveX controls without prompt property must be used in approved domains only (Internet zone).DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI1070-IE11 - Prevent per-user installation of ActiveX controls must be enabled.DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI1095-IE11 - The Initialize and script ActiveX controls not marked as safe must be disallowed (Trusted Sites Zone).DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Microsoft Project 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Microsoft Access 2013 v1r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO117 - Saved from URL mark to assure Internet zone processing must be enforced.DISA STIG Microsoft Access 2013 v1r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blocked.DISA STIG Microsoft Visio 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO179 - Documents must be configured to not open as Read Write when browsing.DISA STIG Microsoft Office System 2013 v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO346 - Untrusted intranet zone access to Project servers must not be allowed.DISA STIG Microsoft Project 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO409 - The ability to create an online presentation programmatically must be disabled.DISA STIG Microsoft Office System 2013 v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO600 - Macros must be blocked from running in Office 2013 files from the Internet.DISA STIG Microsoft PowerPoint 2013 v1r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-AC-000001 - Macros must be blocked from running in Access files from the Internet.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000001 - The Macro Runtime Scan Scope must be enabled for all documents.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000006 - Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000025 - The Save from URL feature must be enabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000001 - Trusted Locations on the network must be disabled in Excel.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000027 - Macros must be blocked from running in Excel files from the Internet.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000032 - Files from unsafe locations must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000033 - Files failing file validation must be opened in Excel in Protected view mode and disallow edits.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000034 - File attachments from Outlook must be opened in Excel in Protected mode.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000003 - Scripts associated with public folders must be prevented from execution in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000004 - Scripts associated with shared folders must be prevented from execution in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000007 - Active X One-Off forms must only be enabled to load with Outlook Controls.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000019 - Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PR-000001 - Trusted Locations on the network must be disabled in Project.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000005 - Encrypted macros in PowerPoint Open XML presentations must be scanned.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000006 - File validation in PowerPoint must be enabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000012 - If file validation fails, files must be opened in Protected view in PowerPoint with ability to edit disabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000002 - Trusted Locations on the network must be disabled in Visio.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000002 - In Word, encrypted macros must be scanned.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000017 - Trusted Locations on the network must be disabled in Word.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-030060 - The operating system must disable information system functionality that provides the capability for automatic execution of code on mobile devices without user direction.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000008 - Microsoft Defender AV must be configured to disable local setting override for reporting to Microsoft MAPS.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000010 - Microsoft Defender AV must be configured to join Microsoft MAPS.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000011 - Microsoft Defender AV must be configured to only send safe samples for MAPS telemetry.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000016 - Microsoft Defender AV must be configured to not allow override of behavior monitoring.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000032 - Microsoft Defender AV must be configured to block executable content from email client and webmail.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000033 - Microsoft Defender AV must be configured block Office applications from creating child processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000034 - Microsoft Defender AV must be configured block Office applications from creating executable content.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000035 - Microsoft Defender AV must be configured to block Office applications from injecting into other processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000036 - Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000037 - Microsoft Defender AV must be configured to block execution of potentially obfuscated scripts.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000038 - Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000039 - Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION