Item Search

NameAudit NamePluginCategory
ADBP-XI-000210 - Adobe Acrobat Pro XI Enhanced Security for browser mode must be enabled.DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBC-0065 - URLs must be allowlisted for Autoplay use.DISA STIG Google Chrome v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBC-0067 - Collection of WebRTC event logs must be disabled.DISA STIG Google Chrome v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI022-IE11 - The Download signed ActiveX controls property must be disallowed (Internet zone).DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI062-IE11 - Anti-Malware programs against ActiveX controls must be run for the Intranet zone.DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI350-IE11 - Software must be disallowed to run or install with invalid signatures.DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI590-IE11 - Internet Explorer Processes for MIME handling must be enforced. (Reserved)DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI1125-IE11 - VBScript must not be allowed to run in Internet Explorer (Internet zone) - Internet zoneDISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000080 - Oracle JRE 8 must disable the dialog enabling users to grant permissions to execute signed content from an untrusted authority - deployment.security.askgrantdialog.notincaDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000110 - Oracle JRE 8 must prevent the download of prohibited mobile code - deployment.security.blacklist.checkDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000170 - Oracle JRE 8 must prompt the user for action prior to executing mobile code - deployment.insecure.jresDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000005 - ActiveX Controls must be initialized in Safe Mode.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000014 - Add-on Management must be enabled for all Office 365 ProPlus programs.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-CO-000022 - Protection from zone elevation must be enabled in all Office programs.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000007 - Open/save of Excel 2 macrosheets and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000011 - Open/save of Excel 4 macrosheets and add-in files must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000015 - Open/save of Excel 95-97 workbooks and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000017 - Open/save of Web pages and Excel 2003 XML spreadsheets must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000027 - Macros must be blocked from running in Excel files from the Internet.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000031 - Files from Internet zone must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000032 - Files from unsafe locations must be opened in Excel in Protected View mode.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-EX-000033 - Files failing file validation must be opened in Excel in Protected view mode and disallow edits.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000003 - Scripts associated with public folders must be prevented from execution in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000012 - The warning about invalid digital signatures must be enabled to warn Outlook users.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000016 - The display of Level 1 attachments must be disabled in Outlook.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000019 - Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000020 - When a custom action is executed that uses the Outlook object model, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000025 - When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000026 - When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-OU-000028 - The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PR-000001 - Trusted Locations on the network must be disabled in Project.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000004 - The default file block behavior must be set to not open blocked files in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000010 - PowerPoint attachments opened from Outlook must be in Protected View.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000008 - Open/Save of Word 2 and earlier binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000013 - Open/Save of Word 95 binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000073 - The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code.DISA STIG Palo Alto ALG v3r4Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000020 - The Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000008 - Microsoft Defender AV must be configured to disable local setting override for reporting to Microsoft MAPS.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000011 - Microsoft Defender AV must be configured to only send safe samples for MAPS telemetry.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000013 - Microsoft Defender AV must be configured to not allow local override of monitoring for file and program activity.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000015 - Microsoft Defender AV must be configured to not allow override of scanning for downloaded files and attachments.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000020 - Microsoft Defender AV must be configured to scan all downloaded files and attachments.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000031 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Severe - 5>2DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000032 - Microsoft Defender AV must be configured to block executable content from email client and webmail.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000033 - Microsoft Defender AV must be configured block Office applications from creating child processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000035 - Microsoft Defender AV must be configured to block Office applications from injecting into other processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000036 - Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000038 - Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000039 - Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000041 - Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Medium - EnabledDISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION