Item Search

NameAudit NamePluginCategory
1.1.3.2.2 Ensure 'Require that application add-ins are signed by Trusted Publisher' is set to EnabledCIS Microsoft Office Access 2013 v1.0.1Windows

SYSTEM AND INFORMATION INTEGRITY

1.1.3.2.2 Ensure 'Require that application add-ins are signed by Trusted Publisher' is set to EnabledCIS Microsoft Office Access 2016 v1.0.1Windows

SYSTEM AND INFORMATION INTEGRITY

1.2.1.13 Ensure 'Navigate URL' is set to Enabled - exprwd.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.13 Ensure 'Navigate URL' is set to Enabled - msaccess.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.6.6.2.6 Ensure 'Require That Application Add-ins are Signed by Trusted Publisher' is set to EnabledCIS Microsoft Office PowerPoint 2013 v1.0.1Windows

SYSTEM AND INFORMATION INTEGRITY

2.2.9 Ensure 'Allow log on locally' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.9 Ensure 'Allow log on locally' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.26 Ensure 'Deny log on as a batch job' to include 'Guests' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.2.30 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.3.25.1.3 Ensure 'Disable Opt-in Wizard on first run' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT

2.3.27.18 Ensure 'Protect document metadata for rights managed Office Open XML Files' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.8 Set 'Enable OOF messages to remote domains' to 'None'CIS Microsoft Exchange Server 2016 Hub v1.0.0Windows

CONFIGURATION MANAGEMENT

Block Flash activation in Office documents - Compatibility Flags - D27CDB6E-AE6D-11CF-96B8-444553540000 - office 16.0 - 32-bitMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block Flash activation in Office documents - Compatibility Flags - D27CDB70-AE6D-11CF-96B8-444553540000 - office 16.0 - 64-bitMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DG0096-ORACLE11 - The DBMS IA policies and procedures should be reviewed annually or more frequently.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DTOO130 - The configuration for enabling of hyperlinks must be enforcedDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO132 - File Downloads must be configured for proper restrictionsDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO135 - Database functionality configurations must be displayed to the userDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO197 - Smart Documents use of Manifests in Office must be disallowed.DISA Microsoft Office System 2016 STIG v2r4Windows

CONFIGURATION MANAGEMENT

DTOO211 - ActiveX Installs must be configured for proper restrictionDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO408 - Office Presentation Service must be removed as an option for presenting PowerPoint and Word online.DISA STIG Microsoft Office System 2013 v2r2Windows

CONFIGURATION MANAGEMENT

DTOO409 - The ability to create an online presentation programmatically must be disabled.DISA Microsoft Office System 2016 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-AC-000001 - Macros must be blocked from running in Access files from the Internet.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000012 - Office applications must not load XML expansion packs with Smart Documents.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-CO-000016 - User name and password must be disabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000018 - The Local Machine Zone Lockdown Security must be enabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-EX-000005 - Open/save of dBase III / IV format files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000006 - Open/save of Dif and Sylk format files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000020 - Loading of pictures from Web pages not created in Excel must be disabled.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000034 - File attachments from Outlook must be opened in Excel in Protected mode.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000001 - The Exchange client authentication with Exchange servers must be enabled to use Kerberos Password Authentication.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

IDENTIFICATION AND AUTHENTICATION

O365-OU-000004 - Scripts associated with shared folders must be prevented from execution in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000006 - The junk email protection level must be set to No Automatic Filtering.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-OU-000007 - Active X One-Off forms must only be enabled to load with Outlook Controls.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000013 - Outlook must be configured to allow retrieving of Certificate Revocation Lists (CRLs) always when online.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

IDENTIFICATION AND AUTHENTICATION

O365-OU-000014 - The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-OU-000022 - When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000024 - When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000027 - Outlook must be configured to not allow hyperlinks in suspected phishing messages.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-PT-000002 - The ability to run programs from PowerPoint must be disabled.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000009 - Files downloaded from the Internet must be opened in Protected view in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PU-000003 - Publisher must disable all unsigned VBA macros.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-VI-000001 - VBA Macros not digitally signed must be blocked in Visio.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-VI-000006 - Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000007 - Macros must be blocked from running in Visio files from the Internet.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000001 - Word must automatically disable unsigned add-ins without informing users.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-WD-000003 - Files downloaded from the Internet must be opened in Protected view in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000004 - Files located in unsafe locations must be opened in Protected view in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000006 - Word attachments opened from Outlook must be in Protected View.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000018 - VBA Macros not digitally signed must be blocked in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT