UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Microsoft Access 2016 STIG


Overview

Date Finding Count (16)
2016-12-01 CAT I (High): 0 CAT II (Med): 15 CAT III (Low): 1
STIG Description
The Microsoft Access 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Public)

Finding ID Severity Title
V-70953 Medium Trust access for VBA must be disallowed.
V-70941 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
V-70951 Medium ActiveX Installs must be configured for proper restriction.
V-70925 Medium Enabling IE Bind to Object functionality must be present.
V-70945 Medium Database functionality configurations must be displayed to the user.
V-70927 Medium Saved from URL mark to assure Internet zone processing must be enforced.
V-70949 Medium Protection from zone elevation must be enforced.
V-70929 Medium Navigation to URLs embedded in Office products must be blocked.
V-70939 Medium The configuration for enabling of hyperlinks must be enforced.
V-70943 Medium File Downloads must be configured for proper restrictions.
V-70931 Medium Scripted Window Security must be enforced.
V-70933 Medium Add-on Management functionality must be allowed.
V-70907 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-70935 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
V-70937 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.
V-70947 Low The Save commands default file format must be configured.