ARDC-CL-000015 - Adobe Reader DC must enable Protected Mode. | DISA STIG Adobe Acrobat Reader DC Classic Track v1r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CL-000035 - Adobe Reader DC must prevent opening files other than PDF or FDF. | DISA STIG Adobe Acrobat Reader DC Classic Track v1r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000010 - Adobe Reader DC must enable Enhanced Security in a Browser. | DISA STIG Adobe Acrobat Reader DC Continuous Track v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000025 - Adobe Reader DC must Block Websites. | DISA STIG Adobe Acrobat Reader DC Continuous Track v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000035 - Adobe Reader DC must prevent opening files other than PDF or FDF. | DISA STIG Adobe Acrobat Reader DC Continuous Track v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
IIST-SV-000130 - Java software installed on a production IIS 10.0 web server must be limited to .class files and the Java Virtual Machine. | DISA IIS 10.0 Server v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
JRE8-WN-000170 - Oracle JRE 8 must prompt the user for action prior to executing mobile code - deployment.insecure.jres.locked | DISA STIG Oracle JRE 8 Windows v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
JUSX-IP-000008 - The Juniper Networks SRX Series Gateway IDPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. | DISA Juniper SRX Services Gateway IDPS v2r1 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-CO-000016 - User name and password must be disabled in all Office programs. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-CO-000020 - Navigate URL must be enabled in all Office programs. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-CO-000022 - Protection from zone elevation must be enabled in all Office programs. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-EX-000011 - Open/save of Excel 4 macrosheets and add-in files must be blocked. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-EX-000019 - Updating of links in Excel must be prompted and not automatic. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-EX-000020 - Loading of pictures from Web pages not created in Excel must be disabled. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-EX-000024 - Scan of encrypted macros in Excel Open XML workbooks must be enabled. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-EX-000025 - File validation in Excel must be enabled. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-OU-000012 - The warning about invalid digital signatures must be enabled to warn Outlook users. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-OU-000016 - The display of Level 1 attachments must be disabled in Outlook. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-OU-000021 - When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-PT-000002 - The ability to run programs from PowerPoint must be disabled. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-PT-000007 - Macros from the Internet must be blocked from running in PowerPoint. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-PT-000009 - Files downloaded from the Internet must be opened in Protected view in PowerPoint. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-PT-000010 - PowerPoint attachments opened from Outlook must be in Protected View. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-PT-000011 - Files in unsafe locations must be opened in Protected view in PowerPoint. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-PU-000001 - Publisher must be configured to prompt the user when another application programmatically opens a macro. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-VI-000005 - Visio 2003-2010 Binary Drawings, Templates and Stencils must be blocked. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-VI-000007 - Macros must be blocked from running in Visio files from the Internet. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-WD-000006 - Word attachments opened from Outlook must be in Protected View. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
O365-WD-000016 - In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
PANW-AG-000074 - The Palo Alto Networks security platform must prevent the download of prohibited mobile code - Antivirus Protocols | DISA STIG Palo Alto ALG v3r1 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
PANW-IP-000020 - The Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary - antivirus rules | DISA STIG Palo Alto IDPS v3r1 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
PANW-IP-000020 - The Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary - security rules | DISA STIG Palo Alto IDPS v3r1 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
SOL-11.1-040200 - The system must restrict the ability of users to assume excessive privileges to members of a defined group and prevent unauthorized users from accessing administrative tools. | DISA STIG Solaris 11 SPARC v3r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SOL-11.1-090100 - The operating system must prevent the execution of prohibited mobile code. | DISA STIG Solaris 11 X86 v3r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000250 - AutoPlay must be turned off for non-volume devices. | DISA Windows Server 2016 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000250 - AutoPlay must be turned off for non-volume devices. | DISA Windows Server 2016 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000260 - The default AutoRun behavior must be configured to prevent AutoRun commands. | DISA Windows Server 2016 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000260 - The default AutoRun behavior must be configured to prevent AutoRun commands. | DISA Windows Server 2016 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000270 - AutoPlay must be disabled for all drives. | DISA Windows Server 2016 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000270 - AutoPlay must be disabled for all drives. | DISA Windows Server 2016 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000420 - Attachments must be prevented from being downloaded from RSS feeds. | DISA Windows Server 2016 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000420 - Attachments must be prevented from being downloaded from RSS feeds. | DISA Windows Server 2016 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000210 - Windows Server 2019 Autoplay must be turned off for non-volume devices. | DISA Windows Server 2019 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000210 - Windows Server 2019 Autoplay must be turned off for non-volume devices. | DISA Windows Server 2019 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000220 - Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands. | DISA Windows Server 2019 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000220 - Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands. | DISA Windows Server 2019 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000230 - Windows Server 2019 AutoPlay must be disabled for all drives. | DISA Windows Server 2019 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000230 - Windows Server 2019 AutoPlay must be disabled for all drives. | DISA Windows Server 2019 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000390 - Windows Server 2019 must prevent attachments from being downloaded from RSS feeds. | DISA Windows Server 2019 STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-CC-000390 - Windows Server 2019 must prevent attachments from being downloaded from RSS feeds. | DISA Windows Server 2019 STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |