| V-223280 | | Macros must be blocked from running in Access files from the Internet. | This policy setting allows you to block macros from running in Office files that come from the Internet.
If you enable this policy setting, macros ar... |
| V-223281 | | Trust Bar Notifications for unsigned application add-ins in Access must be disabled and blocked. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-223282 | | VBA macros not digitally signed must be blocked in Access. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If this policy se... |
| V-223284 | | The Macro Runtime Scan Scope must be enabled for all documents. | This policy setting specifies for which documents the VBA Runtime Scan feature is enabled.
If the feature is disabled for all documents, no runtime s... |
| V-223286 | | The Office client must be prevented from polling the SharePoint Server for published links. | This policy setting controls whether Office 365 ProPlus applications can poll Office servers to retrieve lists of published links.
If this policy se... |
| V-223287 | | Custom user interface (UI) code must be blocked from loading in all Office applications. | This policy setting controls whether Office 365 ProPlus applications load any custom user interface (UI) code included with a document or template. Of... |
| V-223288 | | ActiveX Controls must be initialized in Safe Mode. | This policy setting specifies the Microsoft ActiveX initialization security level for all Microsoft Office applications. ActiveX controls can adversel... |
| V-223289 | | Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level. | This policy setting controls whether macros can run in an Office 365 ProPlus application that is opened programmatically by another application. If th... |
| V-223290 | | Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked. | This policy setting controls whether Office 365 ProPlus applications notify users when potentially unsafe features or content are detected, or whether... |
| V-223291 | | Office applications must be configured to specify encryption type in password-protected Office 97-2003 files. | This policy setting enables you to specify an encryption type for password-protected Office 97-2003 files.
If you enable this policy setting, you can... |
| V-223292 | | Office applications must be configured to specify encryption type in password-protected Office Open XML files. | This policy setting allows you to specify an encryption type for Office Open XML files.
If you enable this policy setting, you can specify the type o... |
| V-223293 | | Users must be prevented from creating new trusted locations in the Trust Center. | This policy setting controls whether trusted locations can be defined by users, the Office Customization Tool (OCT), and Group Policy, or if they must... |
| V-223294 | | Office applications must not load XML expansion packs with Smart Documents. | This policy setting controls whether Office 365 ProPlus applications can load an XML expansion pack manifest file with a Smart Document.... |
| V-223295 | | The load of controls in Forms3 must be blocked. | This policy setting allows the user to control how ActiveX controls in UserForms should be initialized based upon whether they are Safe for Initializa... |
| V-223296 | | Add-on Management must be enabled for all Office 365 ProPlus programs. | Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or othe... |
| V-223297 | | Consistent MIME handling must be enabled for all Office 365 ProPlus programs. | Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied on t... |
| V-223298 | | User name and password must be disabled in all Office programs. | The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com.... |
| V-223299 | | The Information Bar must be enabled in all Office programs. | This policy setting controls whether Office 365 ProPlus applications notify users when potentially unsafe features or content are detected, or whether... |
| V-223300 | | The Local Machine Zone Lockdown Security must be enabled in all Office programs. | Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit... |
| V-223301 | | The MIME Sniffing safety feature must be enabled in all Office programs. | Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon... |
| V-223302 | | Navigate URL must be enabled in all Office programs. | To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for ... |
| V-223303 | | Object Caching Protection must be enabled in all Office programs. | Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon... |
| V-223304 | | Protection from zone elevation must be enabled in all Office programs. | Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit... |
| V-223305 | | ActiveX installation restriction must be enabled in all Office programs. | Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in... |
| V-223306 | | File Download Restriction must be enabled in all Office programs. | Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferenc... |
| V-223307 | | The Save from URL feature must be enabled in all Office programs. | Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indi... |
| V-223308 | | Scripted Windows Security restrictions must be enabled in all Office programs. | Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the use... |
| V-223309 | | Flash player activation must be disabled in all Office programs. | This policy setting controls whether the Adobe Flash control can be activated by Office documents. Note that activation blocking applies only within O... |
| V-223310 | | Trusted Locations on the network must be disabled in Excel. | This policy setting controls whether trusted locations on the network can be used.
If you enable this policy setting, users can specify trusted locat... |
| V-223311 | | VBA Macros not digitally signed must be blocked in Excel. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If you enable thi... |
| V-223312 | | Dynamic Data Exchange (DDE) server launch in Excel must be blocked. | This policy setting allows you to control whether Dynamic Data Exchange (DDE) server launch is allowed.
By default, DDE server launch is turned off, ... |
| V-223313 | | Dynamic Data Exchange (DDE) server lookup in Excel must be blocked. | This policy setting allows you to control whether Dynamic Data Exchange (DDE) server lookup is allowed.
By default, DDE server lookup is turned on, b... |
| V-223314 | | Open/save of dBase III / IV format files must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223315 | | Open/save of Dif and Sylk format files must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223316 | | Open/save of Excel 2 macrosheets and add-in files must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223317 | | Open/save of Excel 2 worksheets must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223318 | | Open/save of Excel 3 macrosheets and add-in files must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223319 | | Open/save of Excel 3 worksheets must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223320 | | Open/save of Excel 4 macrosheets and add-in files must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223321 | | Open/save of Excel 4 workbooks must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223322 | | Open/save of Excel 4 worksheets must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223323 | | Open/save of Excel 95 workbooks must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223324 | | Open/save of Excel 95-97 workbooks and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223325 | | The default file block behavior must be set to not open blocked files in Excel. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223326 | | Open/save of Web pages and Excel 2003 XML spreadsheets must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol... |
| V-223327 | | Extraction options must be blocked when opening corrupt Excel workbooks. | This policy setting controls whether Excel presents users with a list of data extraction options before beginning an Open and Repair operation when us... |
| V-223328 | | Updating of links in Excel must be prompted and not automatic. | This policy setting controls whether Excel prompts users to update automatic links, or whether the updates occur in the background with no prompt.
If... |
| V-223329 | | Loading of pictures from Web pages not created in Excel must be disabled. | This policy setting controls whether Excel loads graphics when opening Web pages that were not created in Excel. It configures the "Load pictures from... |
| V-223330 | | AutoRepublish in Excel must be disabled. | This policy setting allows administrators to disable the AutoRepublish feature in Excel. If users choose to publish Excel data to a static Web page an... |
| V-223331 | | AutoRepublish warning alert in Excel must be enabled. | This policy setting allows administrators to disable the AutoRepublish feature in Excel. If users choose to publish Excel data to a static Web page an... |
| V-223332 | | File extensions must be enabled to match file types in Excel. | This policy setting controls how Excel loads file types that do not match their extension. Excel can load files with extensions that do not match the ... |
| V-223333 | | Scan of encrypted macros in Excel Open XML workbooks must be enabled. | This policy setting controls whether encrypted macros in Open XML workbooks be are required to be scanned with anti-virus software before being opened... |
| V-223334 | | File validation in Excel must be enabled. | This policy setting allows you turn off the file validation feature.
If you enable this policy setting, file validation will be turned off.
If you d... |
| V-223335 | | WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications. | This policy setting controls how Excel will warn users when WEBSERVICE functions are present.
If you enable this policy setting, you can choose from ... |
| V-223336 | | Macros must be blocked from running in Excel files from the Internet. | This policy setting allows you to block macros from running in Office files that come from the Internet.
If you enable this policy setting, macros ar... |
| V-223337 | | Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked. | This policy setting controls whether the specified Office 2016 applications notify users when unsigned application add-ins are loaded or silently disa... |
| V-223338 | | Untrusted Microsoft Query files must be blocked from opening in Excel. | This policy setting controls whether Microsoft Query files (.iqy, oqy, .dqy, and .rqy) in an untrusted location are prevented from opening.
If you en... |
| V-223339 | | Untrusted database files must be opened in Excel in Protected View mode. | This policy setting controls whether database files (.dbf) opened from an untrusted location are always opened in Protected View.
If you enable this ... |
| V-223340 | | Files from Internet zone must be opened in Excel in Protected View mode. | This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View.
If you enable this policy setting, fil... |
| V-223341 | | Files from unsafe locations must be opened in Excel in Protected View mode. | This policy setting lets you determine if files located in unsafe locations will open in Protected View. If you have not specified unsafe locations, o... |
| V-223342 | | Files failing file validation must be opened in Excel in Protected view mode and disallow edits. | This policy setting controls how Office handles documents when they fail file validation.
If you enable this policy setting, you can configure the f... |
| V-223343 | | File attachments from Outlook must be opened in Excel in Protected mode. | This policy setting allows you to determine if Excel files in Outlook attachments open in Protected View.
If you enable this policy setting, Outlook ... |
| V-223344 | | The SIP security mode in Lync must be enabled. | When Lync connects to the server, it supports various authentication mechanisms. This policy allows the user to specify whether Digest and Basic authe... |
| V-223345 | | The HTTP fallback for SIP connection in Lync must be disabled. | Prevents from HTTP being used for SIP connection in case TLS or TCP fail.... |
| V-223346 | | The Exchange client authentication with Exchange servers must be enabled to use Kerberos Password Authentication. | This policy setting controls which authentication method Outlook uses to authenticate with Microsoft Exchange Server. Note: Exchange Server supports t... |
| V-223347 | | Outlook must use remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers. | This policy setting controls whether Outlook uses remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers.
If you enab... |
| V-223348 | | Scripts associated with public folders must be prevented from execution in Outlook. | This policy setting controls whether Outlook executes scripts that are associated with custom forms or folder home pages for public folders.... |
| V-223349 | | Scripts associated with shared folders must be prevented from execution in Outlook. | This policy setting controls whether Outlook executes scripts associated with custom forms or folder home pages for shared folders.... |
| V-223350 | | Files dragged from an Outlook e-mail to the file system must be created in ANSI format. | This policy setting controls whether e-mail messages dragged from Outlook to the file system are saved in Unicode or ANSI format.... |
| V-223351 | | The junk email protection level must be set to No Automatic Filtering. | This policy setting controls the Junk E-mail protection level. The Junk E-mail Filter in Outlook helps to prevent junk email messages, also known as s... |
| V-223352 | | Active X One-Off forms must only be enabled to load with Outlook Controls. | By default, third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Controls (Micro... |
| V-223353 | | Outlook must be configured to prevent users overriding attachment security settings. | This policy setting prevents users from overriding the set of attachments blocked by Outlook.
If you enable this policy setting users will be prevent... |
| V-223354 | | Internet must not be included in Safe Zone for picture download in Outlook. | This policy setting controls whether pictures and external content in HTML e-mail messages from untrusted senders on the Internet are downloaded witho... |
| V-223355 | | The Publish to Global Address List (GAL) button must be disabled in Outlook. | This policy setting controls whether Outlook users can publish e-mail certificates to the Global Address List (GAL).
If you enable this policy setti... |
| V-223356 | | The minimum encryption key length in Outlook must be at least 168. | This policy setting allows you to set the minimum key length for an encrypted e-mail message.
If you enable this policy setting, you may set the mini... |
| V-223357 | | The warning about invalid digital signatures must be enabled to warn Outlook users. | This policy setting controls how Outlook warns users about messages with invalid digital signatures.
If you enable this policy setting, you can choos... |
| V-223358 | | Outlook must be configured to allow retrieving of Certificate Revocation Lists (CRLs) always when online. | This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Certificate revocation lists (... |
| V-223359 | | The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy. | This policy setting controls which set of security settings are enforced in Outlook. If you enable this policy setting, you can choose from four optio... |
| V-223360 | | The ability to demote attachments from Level 2 to Level 1 must be disabled. | This policy setting controls whether Outlook users can demote attachments to Level 2 by using a registry key, which will allow them to save files to d... |
| V-223361 | | The display of Level 1 attachments must be disabled in Outlook. | This policy setting controls whether Outlook blocks potentially dangerous attachments designated Level 1. Outlook uses two levels of security to restr... |
| V-223362 | | Level 1 file attachments must be blocked from being delivered. | This policy setting controls whether Outlook users can demote attachments to Level 2 by using a registry key, which will allow them to save files to d... |
| V-223363 | | Level 2 file attachments must be blocked from being delivered. | This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can open them. Files with sp... |
| V-223364 | | Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message. | This policy setting controls whether scripts can run in Outlook forms in which the script and layout are contained within the message. If you enable t... |
| V-223365 | | When a custom action is executed that uses the Outlook object model, Outlook must automatically deny it. | This policy setting controls whether Outlook prompts users before executing a custom action. Custom actions add functionality to Outlook that can be t... |
| V-223366 | | When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it. | This policy setting controls what happens when an untrusted program attempts to gain access to an Address Book using the Outlook object model.
If yo... |
| V-223367 | | When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it. | This policy setting controls what happens when a user designs a custom form in Outlook and attempts to bind an Address Information field to a combinat... |
| V-223368 | | When an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it. | This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically save an item.
If you ena... |
| V-223369 | | When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it. | This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the ''To:'' field, using the... |
| V-223370 | | When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it. | This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a... |
| V-223371 | | When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it. | This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outlook object model.
If you ... |
| V-223372 | | Outlook must be configured to not allow hyperlinks in suspected phishing messages. | This policy setting controls whether hyperlinks in suspected phishing e-mail messages in Outlook are allowed. If you enable this policy setting, Outlo... |
| V-223373 | | The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned. | This policy setting controls the security level for macros in Outlook.
If you enable this policy setting, you can choose from four options for handl... |
| V-223374 | | Trusted Locations on the network must be disabled in Project. | This policy setting controls whether trusted locations on the network can be used.
If you enable this policy setting, users can specify trusted locat... |
| V-223375 | | Project must automatically disable unsigned add-ins without informing users. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-223376 | | VBA Macros not digitally signed must be blocked in Project. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If you enable thi... |
| V-223377 | | VBA Macros not digitally signed must be blocked in PowerPoint. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If you enable thi... |
| V-223378 | | The ability to run programs from PowerPoint must be disabled. | This policy setting controls the prompting and activation behavior for the "Run Programs" option for action buttons in PowerPoint.
If you enable this... |
| V-223379 | | Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of thi... |
| V-223380 | | The default file block behavior must be set to not open blocked files in PowerPoint. | This policy setting allows you to determine if users can open, view, or edit Word files. If you enable this policy setting, you can set one of these o... |
| V-223381 | | Encrypted macros in PowerPoint Open XML presentations must be scanned. | This policy setting controls whether encrypted macros in Open XML presentations are required to be scanned with anti-virus software before being opene... |
| V-223382 | | File validation in PowerPoint must be enabled. | This policy setting allows you to turn off the file validation feature. If you enable this policy setting, file validation will be turned off. If you ... |
| V-223383 | | Macros from the Internet must be blocked from running in PowerPoint. | This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros are... |
| V-223384 | | Unsigned add-ins in PowerPoint must be blocked with no Trust Bar Notification to the user. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-223385 | | Files downloaded from the Internet must be opened in Protected view in PowerPoint. | This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View. If you enable this policy setting, file... |
| V-223386 | | PowerPoint attachments opened from Outlook must be in Protected View. | This policy setting allows for determining whether PowerPoint files in Outlook attachments open in Protected View. If enabling this policy setting, Ou... |
| V-223387 | | Files in unsafe locations must be opened in Protected view in PowerPoint. | This policy setting determines whether files located in unsafe locations will open in Protected View. If unsafe locations have not been specified, onl... |
| V-223388 | | If file validation fails, files must be opened in Protected view in PowerPoint with ability to edit disabled. | This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting, you can configure the fol... |
| V-223389 | | The use of network locations must be ignored in PowerPoint. | This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locati... |
| V-223390 | | Publisher must be configured to prompt the user when another application programmatically opens a macro. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-223391 | | Publisher must automatically disable unsigned add-ins without informing users. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-223392 | | Publisher must disable all unsigned VBA macros. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If this policy se... |
| V-223393 | | VBA Macros not digitally signed must be blocked in Visio. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If you enable thi... |
| V-223394 | | Trusted Locations on the network must be disabled in Visio. | This policy setting controls whether trusted locations on the network can be used.
If you enable this policy setting, users can specify trusted locat... |
| V-223395 | | Visio must automatically disable unsigned add-ins without informing users. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-223396 | | Visio 2000-2002 Binary Drawings, Templates and Stencils must be blocked. | This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.
... |
| V-223397 | | Visio 2003-2010 Binary Drawings, Templates and Stencils must be blocked. | This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.
... |
| V-223398 | | Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked. | This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.
... |
| V-223399 | | Macros must be blocked from running in Visio files from the Internet. | This policy setting allows you to block macros from running in Office files that come from the Internet.
If you enable this policy setting, macros ar... |
| V-223400 | | Word must automatically disable unsigned add-ins without informing users. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-223401 | | In Word, encrypted macros must be scanned. | This policy setting controls whether encrypted macros in Open XML documents be are required to be scanned with anti-virus software before being opened... |
| V-223402 | | Files downloaded from the Internet must be opened in Protected view in Word. | This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View.
If you enable this policy setting, fil... |
| V-223403 | | Files located in unsafe locations must be opened in Protected view in Word. | This policy setting lets you determine if files located in unsafe locations will open in Protected View. If you have not specified unsafe locations, o... |
| V-223404 | | If file validation fails, files must be opened in Protected view in Word with ability to edit disabled. | This policy setting controls how Office handles documents when they fail file validation.
If you enable this policy setting, you can configure the f... |
| V-223405 | | Word attachments opened from Outlook must be in Protected View. | This policy setting allows you to determine if Word files in Outlook attachments open in Protected View.
If you enable this policy setting, Outlook a... |
| V-223406 | | The default file block behavior must be set to not open blocked files in Word. | This policy setting allows you to determine if users can open, view, or edit Word files.
If you enable this policy setting, you can set one of these ... |
| V-223407 | | Open/Save of Word 2 and earlier binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223408 | | Open/Save of Word 2000 binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223409 | | Open/Save of Word 2003 binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223410 | | Open/Save of Word 2007 and later binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223411 | | Open/Save of Word 6.0 binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223412 | | Open/Save of Word 95 binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223413 | | Open/Save of Word 97 binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223414 | | Open/Save of Word XP binary documents and templates must be blocked. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-223415 | | In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center. | This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros are... |
| V-223416 | | Trusted Locations on the network must be disabled in Word. | This policy setting controls whether trusted locations on the network can be used.
If you enable this policy setting, users can specify trusted locat... |
| V-223417 | | VBA Macros not digitally signed must be blocked in Word. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If you enable thi... |
| V-223418 | | File validation in Word must be enabled. | This policy setting allows the file validation feature to be turned off.
If this policy setting is enabled, file validation will be turned off.
If t... |
| V-223285 | | Document metadata for rights managed Office Open XML files must be protected. | This policy setting determines whether metadata is encrypted in Office Open XML files that are protected by Information Rights Management (IRM). If th... |