STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-18 (4) — Mobile Code

CCI-002460

Definition

Enforce organization-defined actions prior to executing mobile code.

Parent Control

SC-18 (4)Mobile CodeSystem and Communications Protection

Linked STIG Checks (35)

V-205599CAT IIThe Mainframe Product must prompt the user for action prior to executing mobile code.Mainframe Product Security Requirements GuideV-238016CAT IIThe configuration for enabling of hyperlinks must be enforced.Microsoft Access 2016 Security Technical Implementation GuideV-238019CAT IIDatabase functionality configurations must be displayed to the user.Microsoft Access 2016 Security Technical Implementation GuideV-238022CAT IIActiveX Installs must be configured for proper restriction.Microsoft Access 2016 Security Technical Implementation GuideV-238187CAT IIActiveX Installs must be configured for proper restriction.Microsoft Excel 2016 Security Technical Implementation GuideV-223288CAT IIActiveX Controls must be initialized in Safe Mode.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223305CAT IIActiveX installation restriction must be enabled in all Office programs.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223309CAT IIFlash player activation must be disabled in all Office programs.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223329CAT IILoading of pictures from Web pages not created in Excel must be disabled.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223365CAT IIWhen a custom action is executed that uses the Outlook object model, Outlook must automatically deny it.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223366CAT IIWhen an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223367CAT IIWhen a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223368CAT IIWhen an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223369CAT IIWhen an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223370CAT IIWhen an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-223371CAT IIWhen an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-238030CAT IIActiveX control initialization must be disabled.Microsoft Office System 2016 Security Technical Implementation GuideV-215538CAT IIActiveX Installs must be configured for proper restriction.Microsoft OneDrive Security Technical Implementation GuideV-238053CAT IIActiveX Installs must be configured for proper restriction.Microsoft OneNote 2016 Security Technical Implementation GuideV-228428CAT IIActiveX Installs must be configured for proper restriction.Microsoft Outlook 2016 Security Technical Implementation GuideV-228444CAT IICustom Outlook Object Model (OOM) action execution prompts must be configured.Microsoft Outlook 2016 Security Technical Implementation GuideV-228445CAT IIObject Model Prompt for programmatic email send behavior must be configured.Microsoft Outlook 2016 Security Technical Implementation GuideV-228446CAT IIObject Model Prompt behavior for programmatic address books must be configured.Microsoft Outlook 2016 Security Technical Implementation GuideV-228447CAT IIObject Model Prompt behavior for programmatic access of user address data must be configured.Microsoft Outlook 2016 Security Technical Implementation GuideV-228448CAT IIObject Model Prompt behavior for Meeting and Task Responses must be configured.Microsoft Outlook 2016 Security Technical Implementation GuideV-228449CAT IIObject Model Prompt behavior for the SaveAs method must be configured.Microsoft Outlook 2016 Security Technical Implementation GuideV-228450CAT IIObject Model Prompt behavior for accessing User Property Formula must be configured.Microsoft Outlook 2016 Security Technical Implementation GuideV-238073CAT IIActiveX Installs must be configured for proper restriction in PowerPoint.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-238088CAT IIActiveX Installs must be configured for proper restriction in PowerPoint Viewer.Microsoft PowerPoint 2016 Security Technical Implementation GuideV-70725CAT IIActiveX Installs must be configured for proper restriction.Microsoft Project 2016 Security Technical Implementation GuideV-238493CAT IIActiveX Installs must be configured for proper restriction.Microsoft Publisher 2016 Security Technical Implementation GuideV-238119CAT IIActiveX Installs must be configured for proper restriction.Microsoft Visio 2016 Security Technical Implementation GuideV-238140CAT IIActiveX Installs must be configured for proper restriction.Microsoft Word 2016 Security Technical Implementation GuideV-254886CAT IIThe Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.Tanium 7.x Application on TanOS Security Technical Implementation GuideV-253841CAT IIThe Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.Tanium 7.x Security Technical Implementation Guide