Item Search

NameAudit NamePluginCategory
IIST-SV-000130 - Java software installed on a production IIS 10.0 web server must be limited to .class files and the Java Virtual Machine.DISA IIS 10.0 Server v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SV-000130 - Java software installed on a production IIS 8.5 web server must be limited to .class files and the Java Virtual Machine.DISA IIS 8.5 Server v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000090 - Oracle JRE 8 must lock the dialog enabling users to grant permissions to execute signed content from an untrusted authority - deployment.security.askgrantdialog.showDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000110 - Oracle JRE 8 must prevent the download of prohibited mobile code - deployment.security.blacklist.check.lockedDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000170 - Oracle JRE 8 must prompt the user for action prior to executing mobile code - deployment.insecure.jres.lockedDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000001 - The Macro Runtime Scan Scope must be enabled for all documents.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000006 - Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000025 - The Save from URL feature must be enabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000001 - Trusted Locations on the network must be disabled in Excel.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000005 - Open/save of dBase III / IV format files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000006 - Open/save of Dif and Sylk format files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000009 - Open/save of Excel 3 macrosheets and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000013 - Open/save of Excel 4 worksheets must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000014 - Open/save of Excel 95 workbooks must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000017 - Open/save of Web pages and Excel 2003 XML spreadsheets must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000026 - WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000030 - Untrusted database files must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000031 - Files from Internet zone must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000032 - Files from unsafe locations must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000003 - Scripts associated with public folders must be prevented from execution in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000017 - Level 1 file attachments must be blocked from being delivered.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000019 - Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000022 - When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000026 - When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000028 - The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000003 - Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000013 - The use of network locations must be ignored in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000004 - Visio 2000-2002 Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000006 - Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000002 - In Word, encrypted macros must be scanned.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000003 - Files downloaded from the Internet must be opened in Protected view in Word.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000005 - If file validation fails, files must be opened in Protected view in Word with ability to edit disabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000007 - The default file block behavior must be set to not open blocked files in Word.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000011 - Open/Save of Word 2007 and later binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000014 - Open/Save of Word 97 binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000265 - OHS utilizing mobile code must meet DoD-defined mobile code requirements.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000073 - The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code - Antivirus PoliciesDISA STIG Palo Alto ALG v3r1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-030060 - The operating system must disable information system functionality that provides the capability for automatic execution of code on mobile devices without user direction.DISA STIG Solaris 11 X86 v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-090100 - The operating system must prevent the execution of prohibited mobile code - Supported VersionDISA STIG Solaris 11 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-090100 - The operating system must prevent the execution of prohibited mobile code - Supported VersionDISA STIG Solaris 11 X86 v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-090100 - The operating system must prevent the execution of prohibited mobile code.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000014 - Microsoft Defender AV must be configured to not allow override of monitoring for incoming and outgoing file activity.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000022 - Microsoft Defender AV must be configured to enable behavior monitoring.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000027 - Microsoft Defender AV must be configured to turn on e-mail scanning.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000031 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Severe - EnabledDISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000031 - Windows Defender AV must be configured for automatic remediation action to be taken for threat alert level Severe - 5>2DISA STIG Windows Defender Antivirus v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000040 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level High - 4>2DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000040 - Windows Defender AV must be configured for automatic remediation action to be taken for threat alert level High - EnabledDISA STIG Windows Defender Antivirus v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000042 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Low - EnabledDISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000042 - Windows Defender AV must be configured for automatic remediation action to be taken for threat alert level Low - EnabledDISA STIG Windows Defender Antivirus v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION