STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-18 (1) — Mobile Code

CCI-001662

Definition

Take organization-defined corrective action when organization-defined unacceptable mobile code is identified.

Parent Control

SC-18 (1)Mobile CodeSystem and Communications Protection

Linked STIG Checks (135)

V-213168CAT IIAdobe Reader DC must enable Enhanced Security in a Standalone Application.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213169CAT IIAdobe Reader DC must enable Enhanced Security in a Browser.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213170CAT IIAdobe Reader DC must enable Protected Mode.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213171CAT IIAdobe Reader DC must enable Protected View.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213172CAT IIAdobe Reader DC must Block Websites.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213173CAT IIAdobe Reader DC must block access to Unknown Websites.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213174CAT IIAdobe Reader DC must prevent opening files other than PDF or FDF.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213175CAT IIAdobe Reader DC must block Flash Content.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-239884CAT IIThe Cisco ASA must block any prohibited mobile code at the enclave boundary when it is detected.Cisco ASA IPS Security Technical Implementation GuideV-278393CAT IINGINX must identify prohibited mobile code.F5 NGINX Security Technical Implementation GuideV-34743CAT IIThe IDPS must block any prohibited mobile code at the enclave boundary when it is detected.Intrusion Detection and Prevention Systems (IDPS) Security Requirements GuideV-206883CAT IIThe IPS must block any prohibited mobile code at the enclave boundary when it is detected.Intrusion Detection and Prevention Systems Security Requirements GuideV-66405CAT IIThe Juniper Networks SRX Series Gateway IDPS must block any prohibited mobile code at the enclave boundary when it is detected.Juniper SRX SG IDPS Security Technical Implementation GuideV-66405CAT IIThe Juniper Networks SRX Series Gateway IDPS must block any prohibited mobile code at the enclave boundary when it is detected.Juniper SRX SG IDPS Security Technical Implementation GuideV-214618CAT IIThe Juniper Networks SRX Series Gateway IDPS must block any prohibited mobile code at the enclave boundary when it is detected.Juniper SRX Services Gateway IDPS Security Technical Implementation GuideV-205514CAT IIThe Mainframe Product must block, quarantine, and/or alert system administrators when prohibited mobile code is identified.Mainframe Product Security Requirements GuideV-238013CAT IIAdd-on Management functionality must be allowed.Microsoft Access 2016 Security Technical Implementation GuideV-238015CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft Access 2016 Security Technical Implementation GuideV-213455CAT IIMicrosoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Severe.Microsoft Defender Antivirus Security Technical Implementation GuideV-213464CAT IIMicrosoft Defender AV must be configured for automatic remediation action to be taken for threat alert level High.Microsoft Defender Antivirus Security Technical Implementation GuideV-213465CAT IIMicrosoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Medium.Microsoft Defender Antivirus Security Technical Implementation GuideV-213466CAT IIMicrosoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Low.Microsoft Defender Antivirus Security Technical Implementation GuideV-272882CAT IIMicrosoft Defender for Endpoint (MDE) must alert administrators on policy violations defined for endpoints.Microsoft Defender for Endpoint Security Technical Implementation GuideV-238156CAT IIOpen/Save actions for Excel 4 macrosheets and add-in files must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238157CAT IIOpen/Save actions for Excel 4 workbooks must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238158CAT IIOpen/Save actions for Excel 4 worksheets must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238159CAT IIActions for Excel 95 workbooks must be configured to edit in Protected View.Microsoft Excel 2016 Security Technical Implementation GuideV-238160CAT IIActions for Excel 95-97 workbooks and templates must be configured to edit in Protected View.Microsoft Excel 2016 Security Technical Implementation GuideV-238161CAT IIBlocking as default file block opening behavior must be enforced.Microsoft Excel 2016 Security Technical Implementation GuideV-238163CAT IIOpen/Save actions for Dif and Sylk files must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238164CAT IIOpen/Save actions for Excel 2 macrosheets and add-in files must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238165CAT IIOpen/Save actions for Excel 2 worksheets must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238166CAT IIOpen/Save actions for Excel 3 macrosheets and add-in files must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238167CAT IIOpen/Save actions for Excel 3 worksheets must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238170CAT IIOpen/Save actions for web pages and Excel 2003 XML spreadsheets must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238171CAT IIFiles from the Internet zone must be opened in Protected View.Microsoft Excel 2016 Security Technical Implementation GuideV-238172CAT IIOpen/Save actions for dBase III / IV files must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238175CAT IIAdd-on Management functionality must be allowed.Microsoft Excel 2016 Security Technical Implementation GuideV-238177CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft Excel 2016 Security Technical Implementation GuideV-238192CAT IIWEBSERVICE functions must be disabled.Microsoft Excel 2016 Security Technical Implementation GuideV-238193CAT IICorrupt workbook options must be disallowed.Microsoft Excel 2016 Security Technical Implementation GuideV-223029CAT IIAnti-Malware programs against ActiveX controls must be run for the Intranet zone.Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223031CAT IIAnti-Malware programs against ActiveX controls must be run for the Trusted Sites zone.Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223037CAT IIAnti-Malware programs against ActiveX controls must be run for the Internet zone.Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223038CAT IIAnti-Malware programs against ActiveX controls must be run for the Restricted Sites zone.Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223086CAT IIAnti-Malware programs against ActiveX controls must be run for the Local Machine zone.Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223286CAT IIThe Office client must be prevented from polling the SharePoint Server for published links.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223295CAT IIThe load of controls in Forms3 must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223296CAT IIAdd-on Management must be enabled for all Office 365 ProPlus programs.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223299CAT IIThe Information Bar must be enabled in all Office programs.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223312CAT IIDynamic Data Exchange (DDE) server launch in Excel must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223313CAT IIDynamic Data Exchange (DDE) server lookup in Excel must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223314CAT IIOpen/save of dBase III / IV format files must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223315CAT IIOpen/save of Dif and Sylk format files must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223316CAT IIOpen/save of Excel 2 macrosheets and add-in files must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223317CAT IIOpen/save of Excel 2 worksheets must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223318CAT IIOpen/save of Excel 3 macrosheets and add-in files must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223319CAT IIOpen/save of Excel 3 worksheets must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223320CAT IIOpen/save of Excel 4 macrosheets and add-in files must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223321CAT IIOpen/save of Excel 4 workbooks must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223322CAT IIOpen/save of Excel 4 worksheets must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223323CAT IIOpen/save of Excel 95 workbooks must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223324CAT IIOpen/save of Excel 95-97 workbooks and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223325CAT IIThe default file block behavior must be set to not open blocked files in Excel.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223326CAT IIOpen/save of Web pages and Excel 2003 XML spreadsheets must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223327CAT IIExtraction options must be blocked when opening corrupt Excel workbooks.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223335CAT IIWEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223338CAT IIUntrusted Microsoft Query files must be blocked from opening in Excel.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223339CAT IIUntrusted database files must be opened in Excel in Protected View mode.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223340CAT IIFiles from Internet zone must be opened in Excel in Protected View mode.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223357CAT IIThe warning about invalid digital signatures must be enabled to warn Outlook users.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223360CAT IIThe ability to demote attachments from Level 2 to Level 1 must be disabled.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223361CAT IIThe display of Level 1 attachments must be disabled in Outlook.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223362CAT IILevel 1 file attachments must be blocked from being delivered.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223363CAT IILevel 2 file attachments must be blocked from being delivered.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223373CAT IIThe Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223379CAT IIOpen/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223380CAT IIThe default file block behavior must be set to not open blocked files in PowerPoint.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223385CAT IIFiles downloaded from the Internet must be opened in Protected view in PowerPoint.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223386CAT IIPowerPoint attachments opened from Outlook must be in Protected View.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223387CAT IIFiles in unsafe locations must be opened in Protected view in PowerPoint.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223390CAT IIPublisher must be configured to prompt the user when another application programmatically opens a macro.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223396CAT IIVisio 2000-2002 Binary Drawings, Templates and Stencils must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223397CAT IIVisio 2003-2010 Binary Drawings, Templates and Stencils must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223398CAT IIVisio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223402CAT IIFiles downloaded from the Internet must be opened in Protected view in Word.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223403CAT IIFiles located in unsafe locations must be opened in Protected view in Word.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223404CAT IIIf file validation fails, files must be opened in Protected view in Word with ability to edit disabled.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223405CAT IIWord attachments opened from Outlook must be in Protected View.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223406CAT IIThe default file block behavior must be set to not open blocked files in Word.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223407CAT IIOpen/Save of Word 2 and earlier binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223408CAT IIOpen/Save of Word 2000 binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223409CAT IIOpen/Save of Word 2003 binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223410CAT IIOpen/Save of Word 2007 and later binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223411CAT IIOpen/Save of Word 6.0 binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223412CAT IIOpen/Save of Word 95 binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223413CAT IIOpen/Save of Word 97 binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223414CAT IIOpen/Save of Word XP binary documents and templates must be blocked.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-238025CAT IITrust Bar notifications for Security messages must be enforced.Microsoft Office System 2016 Security Technical Implementation GuideV-238031CAT IILoad controls in forms3 must be disabled from loading.Microsoft Office System 2016 Security Technical Implementation GuideV-215534CAT IIAdd-on Management functionality must be allowed.Microsoft OneDrive Security Technical Implementation GuideV-215535CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft OneDrive Security Technical Implementation GuideV-238049CAT IIAdd-on Management functionality must be allowed.Microsoft OneNote 2016 Security Technical Implementation GuideV-238050CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft OneNote 2016 Security Technical Implementation GuideV-228424CAT IIAdd-on Management functionality must be allowed.Microsoft Outlook 2016 Security Technical Implementation GuideV-228425CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft Outlook 2016 Security Technical Implementation GuideV-228440CAT IIThe ability to display level 1 attachments must be disallowed.Microsoft Outlook 2016 Security Technical Implementation GuideV-228441CAT IILevel 1 file extensions must be blocked and not removed.Microsoft Outlook 2016 Security Technical Implementation GuideV-228442CAT IILevel 2 file extensions must be blocked and not removed.Microsoft Outlook 2016 Security Technical Implementation GuideV-228464CAT IIAlways warn on untrusted macros must be enforced.Microsoft Outlook 2016 Security Technical Implementation GuideV-238055CAT IIBlocking as default file block opening behavior must be enforced.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238059CAT IIFiles from the Internet zone must be opened in Protected View.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238062CAT IIAdd-on Management functionality must be allowed in PowerPoint.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238064CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238084CAT IIAdd-on Management functionality must be allowed in PowerPoint Viewer.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238085CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint Viewer.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-70713CAT IIAdd-on Management functionality must be allowed.Microsoft Project 2016 Security Technical Implementation GuideV-70717CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft Project 2016 Security Technical Implementation GuideV-238487CAT IIAdd-on Management functionality must be allowed.Microsoft Publisher 2016 Security Technical Implementation GuideV-238489CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft Publisher 2016 Security Technical Implementation GuideV-238495CAT IIFatally corrupt files must be blocked from opening.Microsoft Publisher 2016 Security Technical Implementation GuideV-238113CAT IIAdd-on Management functionality must be allowed.Microsoft Visio 2016 Security Technical Implementation GuideV-238115CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft Visio 2016 Security Technical Implementation GuideV-238122CAT IIBlocking as default file block opening behavior must be enforced.Microsoft Word 2016 Security Technical Implementation GuideV-238126CAT IIFiles from the Internet zone must be opened in Protected View.Microsoft Word 2016 Security Technical Implementation GuideV-238129CAT IIAdd-on Management functionality must be allowed.Microsoft Word 2016 Security Technical Implementation GuideV-238131CAT IILinks that invoke instances of Internet Explorer from within an Office product must be blocked.Microsoft Word 2016 Security Technical Implementation GuideV-238147CAT IIWord 2 and earlier binary documents and templates must be blocked for open/save.Microsoft Word 2016 Security Technical Implementation GuideV-238148CAT IIWord 2000 binary documents and templates must be configured to edit in protected view.Microsoft Word 2016 Security Technical Implementation GuideV-238149CAT IIWord 6.0 binary documents and templates must be configured for block open/save actions.Microsoft Word 2016 Security Technical Implementation GuideV-238150CAT IIWord 95 binary documents and templates must be configured to edit in protected view.Microsoft Word 2016 Security Technical Implementation GuideV-238151CAT IIWord 97 binary documents and templates must be configured to edit in protected view.Microsoft Word 2016 Security Technical Implementation GuideV-238152CAT IIWord XP binary documents and templates must be configured to edit in protected view.Microsoft Word 2016 Security Technical Implementation GuideV-207693CAT IIThe Palo Alto Networks security platform must detect and deny any prohibited mobile or otherwise malicious code at the enclave boundary.Palo Alto Networks IDPS Security Technical Implementation GuideV-242190CAT IIThe TPS must block any prohibited mobile code at the enclave boundary when it is detected.Trend Micro TippingPoint IDPS Security Technical Implementation Guide