UCF STIG Viewer Logo

Microsoft Access 2016 Security Technical Implementation Guide


Date Finding Count (16)
2016-11-02 CAT I (High): 0 CAT II (Med): 16 CAT III (Low): 0
STIG Description
The Microsoft Access 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles

Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-70953 Medium Warning Bar settings for VBA macros must be configured.
V-70927 Medium Saved from URL mark to assure Internet zone processing must be enforced.
V-70951 Medium ActiveX Installs must be configured for proper restriction.
V-70925 Medium Enabling IE Bind to Object functionality must be present.
V-70945 Medium Database functionality configurations must be displayed to the user.
V-70941 Medium Trust Bar Notifications for unsigned application add-ins must be blocked.
V-70949 Medium Protection from zone elevation must be enforced.
V-70947 Medium The Save commands default file format must be configured.
V-70929 Medium Navigation to URLs embedded in Office products must be blocked.
V-70939 Medium The configuration for enabling of hyperlinks must be enforced.
V-70943 Medium File Downloads must be configured for proper restrictions.
V-70931 Medium Scripted Window Security must be enforced.
V-70933 Medium Add-on Management functionality must be allowed.
V-70907 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-70935 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
V-70937 Medium Links that invoke instances of Internet Explorer from within an Office product must be blocked.