Item Search

NameAudit NamePluginCategory
1.2.1.13 Ensure 'Navigate URL' is set to Enabled - mspub.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.13 Ensure 'Navigate URL' is set to Enabled - visio.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.5.1.8 (L1) Ensure 'Navigate URL' is set to 'Enabled'CIS Microsoft Intune for Office v1.1.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.3.4 Ensure 'Maximum lifetime for user ticket renewal' is set to '7 or fewer days' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION

2.3.25.1.4 Ensure 'Enable Customer Experience Improvement Program' is set to 'Disabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT

2.6.6.6.2.8 Ensure 'VBA Macro Notification Settings' is set to 'Enabled: Disable all except digitally signed macros'CIS Microsoft Office Enterprise v1.2.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.4.7 Ensure minimum and maximum requirements are set for password changes - difokCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.7 Ensure minimum and maximum requirements are set for password changes - maxclassrepeatCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.7 Ensure minimum and maximum requirements are set for password changes - maxrepeatCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.7 Ensure minimum and maximum requirements are set for password changes - minclassCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.7 Ensure minimum and maximum requirements are set for password changes - minlenCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

20.68 Ensure 'Unified Extensible Firmware Interface (UEFI) firmware must be configured and run in UEFI mode, not Legacy BIOS'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

AIOS-13-013100 - Apple iOS/iPadOS must implement the management setting: disable paired Apple Watch.MobileIron - DISA Apple iOS/iPadOS 13 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforcedDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - Enabling IE Bind to Object functionality must be presentDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO117 - Saved from URL mark to assure Internet zone processing must be enforcedDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blockedDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO126 - Add-on Management functionality must be allowedDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Links that invoke instances of Internet Explorer from within an Office product must be blockedDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO130 - The configuration for enabling of hyperlinks must be enforcedDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO132 - File Downloads must be configured for proper restrictionsDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO135 - Database functionality configurations must be displayed to the userDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO184 - The Customer Experience Improvement Program for Office must be disabled.DISA STIG Microsoft Office System 2013 v2r2Windows

CONFIGURATION MANAGEMENT

DTOO186 - Trust Bar notifications for Security messages must be enforced.DISA STIG Microsoft Office System 2013 v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO201 - Connection verification of permissions must be enforced.DISA Microsoft Office System 2016 STIG v2r4Windows

ACCESS CONTROL

DTOO211 - ActiveX Installs must be configured for proper restrictionDISA STIG Microsoft Office Access 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO407 - The prompt to save to OneDrive (formerly SkyDrive) must be disabled.DISA STIG Microsoft Office System 2013 v2r2Windows

CONFIGURATION MANAGEMENT

DTOO409 - The ability to create an online presentation programmatically must be disabled.DISA Microsoft Office System 2016 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO412 - The ability to run unsecure Office apps must be disabled.DISA STIG Microsoft Office System 2013 v2r2Windows

CONFIGURATION MANAGEMENT

DTOO412 - The ability to run unsecure Office web add-ins and Catalogs must be disabled.DISA Microsoft Office System 2016 STIG v2r4Windows

CONFIGURATION MANAGEMENT

O365-CO-000005 - ActiveX Controls must be initialized in Safe Mode.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000010 - The Publish to Global Address List (GAL) button must be disabled in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-OU-000016 - The display of Level 1 attachments must be disabled in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000026 - When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000003 - Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000006 - File validation in PowerPoint must be enabled.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000009 - Files downloaded from the Internet must be opened in Protected view in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000011 - Files in unsafe locations must be opened in Protected view in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PU-000003 - Publisher must disable all unsigned VBA macros.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-VI-000001 - VBA Macros not digitally signed must be blocked in Visio.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-VI-000006 - Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000007 - Macros must be blocked from running in Visio files from the Internet.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000001 - Word must automatically disable unsigned add-ins without informing users.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

O365-WD-000003 - Files downloaded from the Internet must be opened in Protected view in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000004 - Files located in unsafe locations must be opened in Protected view in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000006 - Word attachments opened from Outlook must be in Protected View.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000007 - The default file block behavior must be set to not open blocked files in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000012 - Open/Save of Word 6.0 binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000017 - Trusted Locations on the network must be disabled in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000018 - VBA Macros not digitally signed must be blocked in Word.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT