Item Search

NameAudit NamePluginCategory
ARDC-CL-000015 - Adobe Reader DC must enable Protected Mode.DISA STIG Adobe Acrobat Reader DC Classic Track v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ARDC-CL-000035 - Adobe Reader DC must prevent opening files other than PDF or FDF.DISA STIG Adobe Acrobat Reader DC Classic Track v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ARDC-CN-000010 - Adobe Reader DC must enable Enhanced Security in a Browser.DISA STIG Adobe Acrobat Reader DC Continuous Track v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ARDC-CN-000025 - Adobe Reader DC must Block Websites.DISA STIG Adobe Acrobat Reader DC Continuous Track v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ARDC-CN-000035 - Adobe Reader DC must prevent opening files other than PDF or FDF.DISA STIG Adobe Acrobat Reader DC Continuous Track v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000130 - Java software installed on a production IIS 10.0 web server must be limited to .class files and the Java Virtual Machine.DISA IIS 10.0 Server v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000170 - Oracle JRE 8 must prompt the user for action prior to executing mobile code - deployment.insecure.jres.lockedDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000008 - The Juniper Networks SRX Series Gateway IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000016 - User name and password must be disabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000020 - Navigate URL must be enabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000022 - Protection from zone elevation must be enabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000011 - Open/save of Excel 4 macrosheets and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000019 - Updating of links in Excel must be prompted and not automatic.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000020 - Loading of pictures from Web pages not created in Excel must be disabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000024 - Scan of encrypted macros in Excel Open XML workbooks must be enabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000025 - File validation in Excel must be enabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000012 - The warning about invalid digital signatures must be enabled to warn Outlook users.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000016 - The display of Level 1 attachments must be disabled in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000021 - When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000002 - The ability to run programs from PowerPoint must be disabled.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000007 - Macros from the Internet must be blocked from running in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000009 - Files downloaded from the Internet must be opened in Protected view in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000010 - PowerPoint attachments opened from Outlook must be in Protected View.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000011 - Files in unsafe locations must be opened in Protected view in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PU-000001 - Publisher must be configured to prompt the user when another application programmatically opens a macro.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000005 - Visio 2003-2010 Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000007 - Macros must be blocked from running in Visio files from the Internet.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000006 - Word attachments opened from Outlook must be in Protected View.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000016 - In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center.DISA STIG Microsoft Office 365 ProPlus v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000074 - The Palo Alto Networks security platform must prevent the download of prohibited mobile code - Antivirus ProtocolsDISA STIG Palo Alto ALG v3r1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000020 - The Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary - antivirus rulesDISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000020 - The Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary - security rulesDISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-040200 - The system must restrict the ability of users to assume excessive privileges to members of a defined group and prevent unauthorized users from accessing administrative tools.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-090100 - The operating system must prevent the execution of prohibited mobile code.DISA STIG Solaris 11 X86 v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000250 - AutoPlay must be turned off for non-volume devices.DISA Windows Server 2016 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000250 - AutoPlay must be turned off for non-volume devices.DISA Windows Server 2016 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000260 - The default AutoRun behavior must be configured to prevent AutoRun commands.DISA Windows Server 2016 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000260 - The default AutoRun behavior must be configured to prevent AutoRun commands.DISA Windows Server 2016 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000270 - AutoPlay must be disabled for all drives.DISA Windows Server 2016 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000270 - AutoPlay must be disabled for all drives.DISA Windows Server 2016 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000420 - Attachments must be prevented from being downloaded from RSS feeds.DISA Windows Server 2016 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000420 - Attachments must be prevented from being downloaded from RSS feeds.DISA Windows Server 2016 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000210 - Windows Server 2019 Autoplay must be turned off for non-volume devices.DISA Windows Server 2019 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000210 - Windows Server 2019 Autoplay must be turned off for non-volume devices.DISA Windows Server 2019 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000220 - Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.DISA Windows Server 2019 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000220 - Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands.DISA Windows Server 2019 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000230 - Windows Server 2019 AutoPlay must be disabled for all drives.DISA Windows Server 2019 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000230 - Windows Server 2019 AutoPlay must be disabled for all drives.DISA Windows Server 2019 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000390 - Windows Server 2019 must prevent attachments from being downloaded from RSS feeds.DISA Windows Server 2019 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000390 - Windows Server 2019 must prevent attachments from being downloaded from RSS feeds.DISA Windows Server 2019 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION