STIGhub
STIGs
RMF Controls
Compare
← SC-18 (4) — Mobile Code
CCI-001170
Definition
Prevents the automatic execution of mobile code in organization-defined software applications.
Parent Control
SC-18 (4)
Mobile Code
System and Communications Protection
Linked STIG Checks (158)
V-213168
CAT II
Adobe Reader DC must enable Enhanced Security in a Standalone Application.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213169
CAT II
Adobe Reader DC must enable Enhanced Security in a Browser.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213170
CAT II
Adobe Reader DC must enable Protected Mode.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213171
CAT II
Adobe Reader DC must enable Protected View.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213172
CAT II
Adobe Reader DC must Block Websites.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213173
CAT II
Adobe Reader DC must block access to Unknown Websites.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213174
CAT II
Adobe Reader DC must prevent opening files other than PDF or FDF.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213175
CAT II
Adobe Reader DC must block Flash Content.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-278393
CAT II
NGINX must identify prohibited mobile code.
F5 NGINX Security Technical Implementation Guide
V-221563
CAT III
Extensions that are approved for use must be allowlisted.
Google Chrome Current Windows Security Technical Implementation Guide
V-221596
CAT II
URLs must be allowlisted for Autoplay use.
Google Chrome Current Windows Security Technical Implementation Guide
V-205516
CAT II
The Mainframe Product must prevent the automatic execution of mobile code in, at a minimum, office applications, browsers, email clients, mobile code run-time environments, and mobile agent systems.
Mainframe Product Security Requirements Guide
V-238008
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft Access 2016 Security Technical Implementation Guide
V-238010
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft Access 2016 Security Technical Implementation Guide
V-238011
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft Access 2016 Security Technical Implementation Guide
V-213432
CAT II
Microsoft Defender AV must be configured to disable local setting override for reporting to Microsoft MAPS.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213434
CAT II
Microsoft Defender AV must join Microsoft MAPS.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213435
CAT II
Microsoft Defender AV must be configured to only send safe samples for MAPS telemetry.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213440
CAT II
Microsoft Defender AV must be configured to not allow override of behavior monitoring.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213446
CAT II
Microsoft Defender AV must be configured to enable behavior monitoring.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213451
CAT II
Microsoft Defender AV must be configured to turn on e-mail scanning.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213456
CAT II
Microsoft Defender AV must be configured to block executable content from email client and webmail.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213457
CAT II
Microsoft Defender AV must be configured block Office applications from creating child processes.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213458
CAT II
Microsoft Defender AV must be configured block Office applications from creating executable content.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213459
CAT II
Microsoft Defender AV must be configured to block Office applications from injecting into other processes.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213460
CAT II
Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213461
CAT II
Microsoft Defender AV must be configured to block execution of potentially obfuscated scripts.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213462
CAT II
Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-213463
CAT II
Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278647
CAT II
Microsoft Defender AV must block Adobe Reader from creating child processes.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278648
CAT II
Microsoft Defender AV must block credential stealing from the Windows local security authority subsystem.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278649
CAT II
Microsoft Defender AV must block untrusted and unsigned processes that run from USB.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278650
CAT II
Microsoft Defender AV must use advanced protection against ransomware.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278651
CAT II
Microsoft Defender AV must audit process creations originating from PSExec and WMI commands.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278652
CAT II
Microsoft Defender AV must audit persistence through WMI event subscription.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278653
CAT II
Microsoft Defender AV must audit executable files from running unless they meet a prevalence, age, or trusted list criterion.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278654
CAT II
Microsoft Defender AV must block Office communication application from creating child processes.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278655
CAT II
Microsoft Defender AV must block abuse of exploited vulnerable signed drivers.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278656
CAT II
Microsoft Defender AV must configure local administrator merge behavior for lists.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278658
CAT II
Microsoft Defender AV must control whether exclusions are visible to Local Admins.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278660
CAT II
Microsoft Defender AV must hide the Family options area.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278661
CAT II
Microsoft Defender AV must enable the file hash computation feature.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278662
CAT II
Microsoft Defender AV must enable extended cloud check.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278672
CAT II
Microsoft Defender AV must enable network protection to be configured into block or audit mode on Windows Server.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278674
CAT II
Microsoft Defender AV must enable EDR in block mode.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278675
CAT II
Microsoft Defender AV must report Dynamic Signature dropped events.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278677
CAT II
Microsoft Defender AV must convert warn verdict to block.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278678
CAT II
Microsoft Defender AV must enable asynchronous inspection.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-278863
CAT II
Microsoft Defender AV must set cloud protection level to High.
Microsoft Defender Antivirus Security Technical Implementation Guide
V-238155
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238168
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238173
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238180
CAT II
All automatic loading from trusted locations must be disabled.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238181
CAT II
Disallowance of trusted locations on the network must be enforced.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238183
CAT II
The scanning of encrypted macros in open XML documents must be enforced.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238184
CAT II
Macro storage must be in personal macro workbooks.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238188
CAT II
Files in unsafe locations must be opened in Protected View.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238189
CAT II
Document behavior if file validation fails must be set.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238190
CAT II
Excel attachments opened from Outlook must be in Protected View.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238194
CAT II
Macros must be blocked from running in Office files from the Internet.
Microsoft Excel 2016 Security Technical Implementation Guide
V-238195
CAT II
Files on local Intranet UNC must be opened in Protected View.
Microsoft Excel 2016 Security Technical Implementation Guide
V-223019
CAT II
The Initialize and script ActiveX controls not marked as safe property must be disallowed (Internet zone).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223041
CAT II
Prevent per-user installation of ActiveX controls must be enabled.
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223045
CAT II
The Initialize and script ActiveX controls not marked as safe must be disallowed (Intranet Zone).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223046
CAT II
The Initialize and script ActiveX controls not marked as safe must be disallowed (Trusted Sites Zone).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223057
CAT II
The Initialize and script ActiveX controls not marked as safe property must be disallowed (Restricted Sites zone).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223059
CAT II
ActiveX controls marked safe for scripting must be disallowed (Restricted Sites zone).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223076
CAT II
Software must be disallowed to run or install with invalid signatures.
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223134
CAT II
ActiveX controls without prompt property must be used in approved domains only (Internet zone).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223140
CAT II
ActiveX controls without prompt property must be used in approved domains only (Restricted Sites zone).
Microsoft Internet Explorer 11 Security Technical Implementation Guide
V-223280
CAT II
Macros must be blocked from running in Access files from the Internet.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223284
CAT II
The Macro Runtime Scan Scope must be enabled for all documents.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223289
CAT II
Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223298
CAT II
User name and password must be disabled in all Office programs.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223302
CAT II
Navigate URL must be enabled in all Office programs.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223307
CAT II
The Save from URL feature must be enabled in all Office programs.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223310
CAT II
Trusted Locations on the network must be disabled in Excel.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223328
CAT II
Updating of links in Excel must be prompted and not automatic.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223333
CAT II
Scan of encrypted macros in Excel Open XML workbooks must be enabled.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223336
CAT II
Macros must be blocked from running in Excel files from the Internet.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223341
CAT II
Files from unsafe locations must be opened in Excel in Protected View mode.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223342
CAT II
Files failing file validation must be opened in Excel in Protected view mode and disallow edits.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223343
CAT II
File attachments from Outlook must be opened in Excel in Protected mode.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223348
CAT II
Scripts associated with public folders must be prevented from execution in Outlook.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223349
CAT II
Scripts associated with shared folders must be prevented from execution in Outlook.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223352
CAT II
Active X One-Off forms must only be enabled to load with Outlook Controls.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223364
CAT II
Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223374
CAT II
Trusted Locations on the network must be disabled in Project.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223378
CAT II
The ability to run programs from PowerPoint must be disabled.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223381
CAT II
Encrypted macros in PowerPoint Open XML presentations must be scanned.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223382
CAT II
File validation in PowerPoint must be enabled.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223383
CAT II
Macros from the Internet must be blocked from running in PowerPoint.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223388
CAT II
If file validation fails, files must be opened in Protected view in PowerPoint with ability to edit disabled.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223389
CAT II
The use of network locations must be ignored in PowerPoint.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223394
CAT II
Trusted Locations on the network must be disabled in Visio.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223399
CAT II
Macros must be blocked from running in Visio files from the Internet.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223401
CAT II
In Word, encrypted macros must be scanned.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223415
CAT II
In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-223416
CAT II
Trusted Locations on the network must be disabled in Word.
Microsoft Office 365 ProPlus Security Technical Implementation Guide
V-238032
CAT II
Automation Security to enforce macro level security in Office documents must be configured.
Microsoft Office System 2016 Security Technical Implementation Guide
V-238039
CAT II
The ability to create an online presentation programmatically must be disabled.
Microsoft Office System 2016 Security Technical Implementation Guide
V-215529
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft OneDrive Security Technical Implementation Guide
V-215531
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft OneDrive Security Technical Implementation Guide
V-215532
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft OneDrive Security Technical Implementation Guide
V-238044
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft OneNote 2016 Security Technical Implementation Guide
V-238046
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft OneNote 2016 Security Technical Implementation Guide
V-238047
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft OneNote 2016 Security Technical Implementation Guide
V-228419
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228421
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228422
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228433
CAT II
Outlook Object Model scripts must be disallowed to run for shared folders.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228434
CAT II
Outlook Object Model scripts must be disallowed to run for public folders.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228435
CAT II
ActiveX One-Off forms must be configured.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228436
CAT II
The Add-In Trust Level must be configured.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228438
CAT II
Users customizing attachment security settings must be prevented.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-228443
CAT II
Scripts in One-Off Outlook forms must be disallowed.
Microsoft Outlook 2016 Security Technical Implementation Guide
V-238054
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238057
CAT II
The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238060
CAT II
Navigation to URLs embedded in Office products must be blocked in PowerPoint.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238067
CAT II
All automatic loading from trusted locations must be disabled.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238068
CAT II
Disallowance of trusted locations on the network must be enforced.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238070
CAT II
The scanning of encrypted macros in open XML documents must be enforced.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238074
CAT II
Files in unsafe locations must be opened in Protected View.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238075
CAT II
The ability to run programs from a PowerPoint presentation must be disallowed.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238076
CAT II
Document behavior if file validation fails must be set.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238077
CAT II
Attachments opened from Outlook must be in Protected View.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238079
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint Viewer.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238081
CAT II
The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint Viewer.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238082
CAT II
Navigation to URLs embedded in Office products must be blocked in PowerPoint Viewer.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238089
CAT II
Macros must be blocked from running in Office files from the Internet.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-238090
CAT II
Files on local Intranet UNC must be opened in Protected View.
Microsoft PowerPoint 2016 Security Technical Implementation Guide
V-70703
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft Project 2016 Security Technical Implementation Guide
V-70707
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft Project 2016 Security Technical Implementation Guide
V-70709
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft Project 2016 Security Technical Implementation Guide
V-70727
CAT II
Untrusted intranet zone access to Project servers must not be allowed.
Microsoft Project 2016 Security Technical Implementation Guide
V-238482
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft Publisher 2016 Security Technical Implementation Guide
V-238484
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft Publisher 2016 Security Technical Implementation Guide
V-238485
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft Publisher 2016 Security Technical Implementation Guide
V-238496
CAT II
The Publisher Automation Security Level must be configured for high security.
Microsoft Publisher 2016 Security Technical Implementation Guide
V-238108
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft Visio 2016 Security Technical Implementation Guide
V-238110
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft Visio 2016 Security Technical Implementation Guide
V-238111
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft Visio 2016 Security Technical Implementation Guide
V-238121
CAT II
Disabling of user name and password syntax from being used in URLs must be enforced.
Microsoft Word 2016 Security Technical Implementation Guide
V-238124
CAT II
Saved from URL mark to assure Internet zone processing must be enforced.
Microsoft Word 2016 Security Technical Implementation Guide
V-238127
CAT II
Navigation to URLs embedded in Office products must be blocked.
Microsoft Word 2016 Security Technical Implementation Guide
V-238134
CAT II
All automatic loading from trusted locations must be disabled.
Microsoft Word 2016 Security Technical Implementation Guide
V-238135
CAT II
Disallowance of trusted locations on the network must be enforced.
Microsoft Word 2016 Security Technical Implementation Guide
V-238137
CAT II
Force encrypted macros to be scanned in open XML documents must be determined and configured.
Microsoft Word 2016 Security Technical Implementation Guide
V-238141
CAT II
Files in unsafe locations must be opened in Protected View.
Microsoft Word 2016 Security Technical Implementation Guide
V-238142
CAT II
Document behavior if file validation fails must be set.
Microsoft Word 2016 Security Technical Implementation Guide
V-238143
CAT II
Attachments opened from Outlook must be in Protected View.
Microsoft Word 2016 Security Technical Implementation Guide
V-238144
CAT II
The automatically update links feature must be disabled.
Microsoft Word 2016 Security Technical Implementation Guide
V-238146
CAT II
Online translation dictionaries must not be used.
Microsoft Word 2016 Security Technical Implementation Guide
V-238153
CAT II
Macros must be blocked from running in Office files from the Internet.
Microsoft Word 2016 Security Technical Implementation Guide
V-238154
CAT II
Files on local Intranet UNC must be opened in Protected View.
Microsoft Word 2016 Security Technical Implementation Guide
V-219972
CAT II
The operating system must disable information system functionality that provides the capability for automatic execution of code on mobile devices without user direction.
Solaris 11 SPARC Security Technical Implementation Guide
V-219973
CAT II
The system must restrict the ability of users to assume excessive privileges to members of a defined group and prevent unauthorized users from accessing administrative tools.
Solaris 11 SPARC Security Technical Implementation Guide
V-220000
CAT II
The operating system must disable information system functionality that provides the capability for automatic execution of code on mobile devices without user direction.
Solaris 11 X86 Security Technical Implementation Guide