STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-18 (3) — Mobile Code

CCI-001695

Definition

Prevent the execution of organization-defined unacceptable mobile code.

Parent Control

SC-18 (3)Mobile CodeSystem and Communications Protection

Linked STIG Checks (63)

V-213117CAT IIAdobe Acrobat Pro DC Continuous Enhanced Security for standalone mode must be enabled.Adobe Acrobat Professional DC Continuous Track Security Technical Implementation GuideV-213118CAT IIAdobe Acrobat Pro DC Continuous Enhanced Security for browser mode must be enabled.Adobe Acrobat Professional DC Continuous Track Security Technical Implementation GuideV-213168CAT IIAdobe Reader DC must enable Enhanced Security in a Standalone Application.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213169CAT IIAdobe Reader DC must enable Enhanced Security in a Browser.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213170CAT IIAdobe Reader DC must enable Protected Mode.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213171CAT IIAdobe Reader DC must enable Protected View.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213172CAT IIAdobe Reader DC must Block Websites.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213173CAT IIAdobe Reader DC must block access to Unknown Websites.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213174CAT IIAdobe Reader DC must prevent opening files other than PDF or FDF.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-213175CAT IIAdobe Reader DC must block Flash Content.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-204976CAT IIThe ALG providing content filtering must block or restrict detected prohibited mobile code.Application Layer Gateway Security Requirements GuideV-237382CAT IIThe CA API Gateway providing content filtering must block or restrict detected prohibited mobile code.CA API Gateway ALG Security Technical Implementation GuideV-278387CAT IINGINX must prevent the execution of unapproved modules.F5 NGINX Security Technical Implementation GuideV-221570CAT IIBackground processing must be disabled.Google Chrome Current Windows Security Technical Implementation GuideV-205474CAT IIThe Mainframe Product must prevent the execution of prohibited mobile code.Mainframe Product Security Requirements GuideV-238009CAT IIEnabling IE Bind to Object functionality must be present.Microsoft Access 2016 Security Technical Implementation GuideV-238012CAT IIScripted Window Security must be enforced.Microsoft Access 2016 Security Technical Implementation GuideV-238021CAT IIProtection from zone elevation must be enforced.Microsoft Access 2016 Security Technical Implementation GuideV-213437CAT IIMicrosoft Defender AV must be configured to not allow local override of monitoring for file and program activity.Microsoft Defender Antivirus Security Technical Implementation GuideV-213438CAT IIMicrosoft Defender AV must be configured to not allow override of monitoring for incoming and outgoing file activity.Microsoft Defender Antivirus Security Technical Implementation GuideV-238162CAT IIEnabling IE Bind to Object functionality must be present.Microsoft Excel 2016 Security Technical Implementation GuideV-238169CAT IIConfiguration for file validation must be enforced.Microsoft Excel 2016 Security Technical Implementation GuideV-238174CAT IIScripted Window Security must be enforced.Microsoft Excel 2016 Security Technical Implementation GuideV-238186CAT IIProtection from zone elevation must be enforced.Microsoft Excel 2016 Security Technical Implementation GuideV-223034CAT IIInternet Explorer Processes Restrict ActiveX Install must be enforced (Explorer).Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223035CAT IIInternet Explorer Processes Restrict ActiveX Install must be enforced (iexplore).Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223142CAT IIInternet Explorer Processes Restrict ActiveX Install must be enforced (Reserved).Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223304CAT IIProtection from zone elevation must be enabled in all Office programs.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223306CAT IIFile Download Restriction must be enabled in all Office programs.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223308CAT IIScripted Windows Security restrictions must be enabled in all Office programs.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223334CAT IIFile validation in Excel must be enabled.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223418CAT IIFile validation in Word must be enabled.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-215533CAT IIScripted Window Security must be enforced.Microsoft OneDrive Security Technical Implementation GuideV-215537CAT IIProtection from zone elevation must be enforced.Microsoft OneDrive Security Technical Implementation GuideV-238045CAT IIEnabling IE Bind to Object functionality must be present.Microsoft OneNote 2016 Security Technical Implementation GuideV-238048CAT IIScripted Window Security must be enforced.Microsoft OneNote 2016 Security Technical Implementation GuideV-238052CAT IIProtection from zone elevation must be enforced.Microsoft OneNote 2016 Security Technical Implementation GuideV-228420CAT IIEnabling IE Bind to Object functionality must be present.Microsoft Outlook 2016 Security Technical Implementation GuideV-228423CAT IIScripted Window Security must be enforced.Microsoft Outlook 2016 Security Technical Implementation GuideV-228427CAT IIProtection from zone elevation must be enforced.Microsoft Outlook 2016 Security Technical Implementation GuideV-238056CAT IIThe Internet Explorer Bind to Object functionality must be enabled in PowerPoint.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238058CAT IIConfiguration for file validation must be enforced.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238061CAT IIScripted Window Security must be enforced in PowerPoint.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238072CAT IIProtection from zone elevation must be enforced in PowerPoint.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238080CAT IIThe Internet Explorer Bind to Object functionality must be enabled in PowerPoint Viewer.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238083CAT IIScripted Window Security must be enforced in PowerPoint Viewer.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238087CAT IIProtection from zone elevation must be enforced in PowerPoint Viewer.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-70705CAT IIEnabling IE Bind to Object functionality must be present.Microsoft Project 2016 Security Technical Implementation GuideV-70711CAT IIScripted Window Security must be enforced.Microsoft Project 2016 Security Technical Implementation GuideV-70723CAT IIProtection from zone elevation must be enforced.Microsoft Project 2016 Security Technical Implementation GuideV-238483CAT IIEnabling IE Bind to Object functionality must be present.Microsoft Publisher 2016 Security Technical Implementation GuideV-238486CAT IIScripted Window Security must be enforced.Microsoft Publisher 2016 Security Technical Implementation GuideV-238492CAT IIProtection from zone elevation must be enforced.Microsoft Publisher 2016 Security Technical Implementation GuideV-238109CAT IIEnabling IE Bind to Object functionality must be present.Microsoft Visio 2016 Security Technical Implementation GuideV-238112CAT IIScripted Window Security must be enforced.Microsoft Visio 2016 Security Technical Implementation GuideV-238118CAT IIProtection from zone elevation must be enforced.Microsoft Visio 2016 Security Technical Implementation GuideV-238123CAT IIThe Internet Explorer Bind to Object functionality must be enabled.Microsoft Word 2016 Security Technical Implementation GuideV-238125CAT IIConfiguration for file validation must be enforced.Microsoft Word 2016 Security Technical Implementation GuideV-238128CAT IIScripted Window Security must be enforced.Microsoft Word 2016 Security Technical Implementation GuideV-238139CAT IIProtection from zone elevation must be enforced.Microsoft Word 2016 Security Technical Implementation GuideV-228852CAT IIThe Palo Alto Networks security platform must deny or restrict detected prohibited mobile code.Palo Alto Networks ALG Security Technical Implementation GuideV-216464CAT IIThe operating system must prevent the execution of prohibited mobile code.Solaris 11 SPARC Security Technical Implementation GuideV-216228CAT IIThe operating system must prevent the execution of prohibited mobile code.Solaris 11 X86 Security Technical Implementation Guide