UCF STIG Viewer Logo

Microsoft Visio 2013 STIG


Date Finding Count (14)
2013-12-12 CAT I (High): 0 CAT II (Med): 14 CAT III (Low): 0
STIG Description
The Microsoft Visio 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil.

Available Profiles

Findings (MAC I - Mission Critial Public)

Finding ID Severity Title
V-40741 Medium ActiveX installs must be configured for proper restrictions.
V-40740 Medium Protection from zone elevation must be enforced.
V-40743 Medium Visio 2013 application must be prevented from loading any custom user interface (UI) code.
V-40742 Medium Warning Bar settings for VBA macros must be configured.
V-40734 Medium Scripted Window Security must be enforced.
V-40735 Medium Add-on Management functionality must be allowed.
V-40736 Medium Add-ins to Office applications must be signed by a Trusted Publisher.
V-40737 Medium Links that invoke instances of IE from within an Office product must be blocked.
V-40730 Medium Disabling of user name and password syntax from being used in URLs must be enforced.
V-40731 Medium The Internet Explorer Bind to Object functionality must be enabled.
V-40732 Medium The Saved from URL mark must be selected to enforce Internet zone processing.
V-40733 Medium Navigation to URLs embedded in Office products must be blocked.
V-40738 Medium Trust Bar Notifications for unsigned applications must be disabled.
V-40739 Medium File downloads must be configured for proper restrictions.