Looking for:
Microsoft office system 2013 stig free.You are viewing this page in an unauthorized frame window.
Currently under development with no specific release date. There are no current plans to develop a STIG. STIG Topics. Privacy and Security Section Site Map.
Login with CAC. Apache 2. Apache Server 2. Apple macOS BIND 9. Canonical Ubuntu Citrix XenDesktop 7. Docker Enterprise 2. Google Android Google Android 9. Honeywell Android 9. IBM Aspera Platform 4. Infoblox 7. Infoblox 8. Ivanti MobileIron Sentry 9. Jamf Pro v McAfee Antivirus 8. McAfee Application Control 8. McAfee Virus Scan 8. Net Framework 4.
Microsoft IIS Microsoft IIS 8. Microsoft Windows Server Microsoft Windows Server Currently under development with no specific release date. Mobile Iron Core v9. MobileIron Core v MongoDB Enterprise Advanced 3. MongoDB Enterprise Advanced 4. Motorola Android 9. Oracle Database Oracle MySQL 8. PostgresSQL 9. Redis Enterprise 6. Samsung Android 11 Knox 3. Samsung Android 12 with Knox 3. Samsung Android OS 10 with Knox 3. Samsung Android OS 9 with Knox 3. SCC 5. Splunk Enterprise 7.
Splunk Enterprise 8. STIG Viewer 2. Sunset – AIX 6. Sunset – Apple macOS Sunset – Apple OS X Sunset – BlackBerry OS Sunset – Canonical Ubuntu Sunset – HP-UX Sunset – McAfee VirusScan 8.
Sunset – Microsoft IIS 7. Sunset – Symantec Endpoint Protection Sunset – VMware AirWatch v9. Sunset – VMware vSphere 6. Sunset Tanium 6. Sunset-McAfee VirusScan 8. Tanium 7. Tomcat AS 6. Tomcat AS 7. Tomcat AS 8. Trend Micro Deep Security 9. VMware Horizon 7.
VMware vRealize Automation 7. VMware vRealize Ops 6. VMware vSphere 6.
Microsoft office system 2013 stig free
Official websites use. Share sensitive information only on official, secure websites. This is not the current revision of this Checklist, view the current revision. You are viewing this page in an unauthorized frame window.
NCP Special Publication. Microsoft office system 2013 stig free Repository. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration.
Unfortunately, this presence also brings about dependence and vulnerabilities. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications.
Where applications do offer security options, the default settings typically do not provide 201 strong security posture. This checklist has been created microsoft office system 2013 stig free IT professionals, particularly Windows system administrators страница information security personnel.
Перейти на источник document assumes that the reader has experience installing and rfee applications on Windows-based systems in domain or standalone configurations.
Microsoft office system 2013 stig free.STIGs Document Library
MobileIron Core v MongoDB Enterprise Advanced 3. MongoDB Enterprise Advanced 4. Motorola Android 9. Oracle Database Oracle MySQL 8. PostgresSQL 9. Redis Enterprise 6. Samsung Android 11 Knox 3. Samsung Android 12 with Knox 3. Samsung Android OS 10 with Knox 3.
Samsung Android OS 9 with Knox 3. SCC 5. Splunk Enterprise 7. Splunk Enterprise 8. STIG Viewer 2. Sunset – AIX 6. Sunset – Apple macOS Sunset – Apple OS X Sunset – BlackBerry OS Sunset – Canonical Ubuntu Sunset – HP-UX Sunset – McAfee VirusScan 8. Sunset – Microsoft IIS 7. Sunset – Symantec Endpoint Protection Sunset – VMware AirWatch v9. Sunset – VMware vSphere 6. Sunset Tanium 6. Sunset-McAfee VirusScan 8. Tanium 7. Tomcat AS 6. Tomcat AS 7. Tomcat AS 8.
Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Where applications do offer security options, the default settings typically do not provide a strong security posture.
This document, and associated STIGs, has set forth requirements based upon having a secured Windows environment. Failure to apply these requirements will significantly diminish the value of the specifications in this document, as well as diminish the overall security posture of the asset to which these settings apply.
Security controls applied to the underlying operating system platform will directly affect the strength of the security that surrounds desktop applications. Specific settings have been included to ensure disabling of saving to the cloud. Additional Office functionality introduced extended settings, some of which were not deemed to impact the security posture of the system. Under those circumstances, specific STIG requirements were not developed.
Other Office extended settings were determined to affect the security posture of the system and have been included as additional STIG requirement settings. SkyDrive is Microsoft’s consumer cloud storage solution. SkyDrive is a personal cloud storage capability for an individual’s personal files, managed by the individual, using the public cloud, and is currently not allowed from a DoD network. SkyDrive Pro is site’s cloud storage for work documents, managed by local IT personnel and uses local SharePoint or on-premises storage.
The guidance provided in the Groove is for the purposes of SkyDrive Pro groove. Office is a subscription-based online office suite, providing hosted email and Microsoft Office desktop applications WebApps. It is installed via the Click-to-Run installation option. Click-to-Run is a Microsoft streaming and virtualization technology that is also used to install and update Microsoft Office desktop products, as an alternative to the traditional Windows Installer-based MSI method.
These streaming and virtualization capabilities are based on technologies in Microsoft Application Virtualization App-V. In Office , Click-to-Run was available to only consumer users. In this new release, Click-to-Run supports large enterprise deployments.