Microsoft Office 365 ProPlus Security Technical Implementation Guide

Overview

VersionDateFinding Count (138)Downloads
32025-03-05CAT I (High): 1CAT II (Medium): 137CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Public

Finding IDSeverityTitleDescription
V-223280
LOWMEDIUMHIGH
Macros must be blocked from running in Access files from the Internet.This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros ar...
V-223281
LOWMEDIUMHIGH
Trust Bar Notifications for unsigned application add-ins in Access must be disabled and blocked.This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ...
V-223282
LOWMEDIUMHIGH
VBA macros not digitally signed must be blocked in Access.This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If this policy se...
V-223284
LOWMEDIUMHIGH
The Macro Runtime Scan Scope must be enabled for all documents.This policy setting specifies for which documents the VBA Runtime Scan feature is enabled. If the feature is disabled for all documents, no runtime s...
V-223286
LOWMEDIUMHIGH
The Office client must be prevented from polling the SharePoint Server for published links.This policy setting controls whether Office 365 ProPlus applications can poll Office servers to retrieve lists of published links. If this policy se...
V-223287
LOWMEDIUMHIGH
Custom user interface (UI) code must be blocked from loading in all Office applications.This policy setting controls whether Office 365 ProPlus applications load any custom user interface (UI) code included with a document or template. Of...
V-223288
LOWMEDIUMHIGH
ActiveX Controls must be initialized in Safe Mode.This policy setting specifies the Microsoft ActiveX initialization security level for all Microsoft Office applications. ActiveX controls can adversel...
V-223289
LOWMEDIUMHIGH
Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.This policy setting controls whether macros can run in an Office 365 ProPlus application that is opened programmatically by another application. If th...
V-223290
LOWMEDIUMHIGH
Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.This policy setting controls whether Office 365 ProPlus applications notify users when potentially unsafe features or content are detected, or whether...
V-223291
LOWMEDIUMHIGH
Office applications must be configured to specify encryption type in password-protected Office 97-2003 files.This policy setting enables you to specify an encryption type for password-protected Office 97-2003 files. If you enable this policy setting, you can...
V-223292
LOWMEDIUMHIGH
Office applications must be configured to specify encryption type in password-protected Office Open XML files.This policy setting allows you to specify an encryption type for Office Open XML files. If you enable this policy setting, you can specify the type o...
V-223293
LOWMEDIUMHIGH
Users must be prevented from creating new trusted locations in the Trust Center.This policy setting controls whether trusted locations can be defined by users, the Office Customization Tool (OCT), and Group Policy, or if they must...
V-223294
LOWMEDIUMHIGH
Office applications must not load XML expansion packs with Smart Documents.This policy setting controls whether Office 365 ProPlus applications can load an XML expansion pack manifest file with a Smart Document....
V-223295
LOWMEDIUMHIGH
The load of controls in Forms3 must be blocked.This policy setting allows the user to control how ActiveX controls in UserForms should be initialized based upon whether they are Safe for Initializa...
V-223296
LOWMEDIUMHIGH
Add-on Management must be enabled for all Office 365 ProPlus programs.Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or othe...
V-223297
LOWMEDIUMHIGH
Consistent MIME handling must be enabled for all Office 365 ProPlus programs.Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied on t...
V-223298
LOWMEDIUMHIGH
User name and password must be disabled in all Office programs.The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com....
V-223299
LOWMEDIUMHIGH
The Information Bar must be enabled in all Office programs.This policy setting controls whether Office 365 ProPlus applications notify users when potentially unsafe features or content are detected, or whether...
V-223300
LOWMEDIUMHIGH
The Local Machine Zone Lockdown Security must be enabled in all Office programs.Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit...
V-223301
LOWMEDIUMHIGH
The MIME Sniffing safety feature must be enabled in all Office programs.Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon...
V-223302
LOWMEDIUMHIGH
Navigate URL must be enabled in all Office programs.To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for ...
V-223303
LOWMEDIUMHIGH
Object Caching Protection must be enabled in all Office programs.Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon...
V-223304
LOWMEDIUMHIGH
Protection from zone elevation must be enabled in all Office programs.Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit...
V-223305
LOWMEDIUMHIGH
ActiveX installation restriction must be enabled in all Office programs.Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in...
V-223306
LOWMEDIUMHIGH
File Download Restriction must be enabled in all Office programs.Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferenc...
V-223307
LOWMEDIUMHIGH
The Save from URL feature must be enabled in all Office programs.Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indi...
V-223308
LOWMEDIUMHIGH
Scripted Windows Security restrictions must be enabled in all Office programs.Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the use...
V-223309
LOWMEDIUMHIGH
Flash player activation must be disabled in all Office programs.This policy setting controls whether the Adobe Flash control can be activated by Office documents. Note that activation blocking applies only within O...
V-223310
LOWMEDIUMHIGH
Trusted Locations on the network must be disabled in Excel.This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locat...
V-223311
LOWMEDIUMHIGH
VBA Macros not digitally signed must be blocked in Excel.This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable thi...
V-223312
LOWMEDIUMHIGH
Dynamic Data Exchange (DDE) server launch in Excel must be blocked.This policy setting allows you to control whether Dynamic Data Exchange (DDE) server launch is allowed. By default, DDE server launch is turned off, ...
V-223313
LOWMEDIUMHIGH
Dynamic Data Exchange (DDE) server lookup in Excel must be blocked.This policy setting allows you to control whether Dynamic Data Exchange (DDE) server lookup is allowed. By default, DDE server lookup is turned on, b...
V-223314
LOWMEDIUMHIGH
Open/save of dBase III / IV format files must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223315
LOWMEDIUMHIGH
Open/save of Dif and Sylk format files must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223316
LOWMEDIUMHIGH
Open/save of Excel 2 macrosheets and add-in files must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223317
LOWMEDIUMHIGH
Open/save of Excel 2 worksheets must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223318
LOWMEDIUMHIGH
Open/save of Excel 3 macrosheets and add-in files must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223319
LOWMEDIUMHIGH
Open/save of Excel 3 worksheets must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223320
LOWMEDIUMHIGH
Open/save of Excel 4 macrosheets and add-in files must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223321
LOWMEDIUMHIGH
Open/save of Excel 4 workbooks must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223322
LOWMEDIUMHIGH
Open/save of Excel 4 worksheets must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223323
LOWMEDIUMHIGH
Open/save of Excel 95 workbooks must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223324
LOWMEDIUMHIGH
Open/save of Excel 95-97 workbooks and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223325
LOWMEDIUMHIGH
The default file block behavior must be set to not open blocked files in Excel.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223326
LOWMEDIUMHIGH
Open/save of Web pages and Excel 2003 XML spreadsheets must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this pol...
V-223327
LOWMEDIUMHIGH
Extraction options must be blocked when opening corrupt Excel workbooks.This policy setting controls whether Excel presents users with a list of data extraction options before beginning an Open and Repair operation when us...
V-223328
LOWMEDIUMHIGH
Updating of links in Excel must be prompted and not automatic.This policy setting controls whether Excel prompts users to update automatic links, or whether the updates occur in the background with no prompt. If...
V-223329
LOWMEDIUMHIGH
Loading of pictures from Web pages not created in Excel must be disabled.This policy setting controls whether Excel loads graphics when opening Web pages that were not created in Excel. It configures the "Load pictures from...
V-223330
LOWMEDIUMHIGH
AutoRepublish in Excel must be disabled.This policy setting allows administrators to disable the AutoRepublish feature in Excel. If users choose to publish Excel data to a static Web page an...
V-223331
LOWMEDIUMHIGH
AutoRepublish warning alert in Excel must be enabled.This policy setting allows administrators to disable the AutoRepublish feature in Excel. If users choose to publish Excel data to a static Web page an...
V-223332
LOWMEDIUMHIGH
File extensions must be enabled to match file types in Excel.This policy setting controls how Excel loads file types that do not match their extension. Excel can load files with extensions that do not match the ...
V-223333
LOWMEDIUMHIGH
Scan of encrypted macros in Excel Open XML workbooks must be enabled.This policy setting controls whether encrypted macros in Open XML workbooks be are required to be scanned with anti-virus software before being opened...
V-223334
LOWMEDIUMHIGH
File validation in Excel must be enabled.This policy setting allows you turn off the file validation feature. If you enable this policy setting, file validation will be turned off. If you d...
V-223335
LOWMEDIUMHIGH
WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.This policy setting controls how Excel will warn users when WEBSERVICE functions are present. If you enable this policy setting, you can choose from ...
V-223336
LOWMEDIUMHIGH
Macros must be blocked from running in Excel files from the Internet.This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros ar...
V-223337
LOWMEDIUMHIGH
Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked.This policy setting controls whether the specified Office 2016 applications notify users when unsigned application add-ins are loaded or silently disa...
V-223338
LOWMEDIUMHIGH
Untrusted Microsoft Query files must be blocked from opening in Excel.This policy setting controls whether Microsoft Query files (.iqy, oqy, .dqy, and .rqy) in an untrusted location are prevented from opening. If you en...
V-223339
LOWMEDIUMHIGH
Untrusted database files must be opened in Excel in Protected View mode.This policy setting controls whether database files (.dbf) opened from an untrusted location are always opened in Protected View. If you enable this ...
V-223340
LOWMEDIUMHIGH
Files from Internet zone must be opened in Excel in Protected View mode.This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View. If you enable this policy setting, fil...
V-223341
LOWMEDIUMHIGH
Files from unsafe locations must be opened in Excel in Protected View mode.This policy setting lets you determine if files located in unsafe locations will open in Protected View. If you have not specified unsafe locations, o...
V-223342
LOWMEDIUMHIGH
Files failing file validation must be opened in Excel in Protected view mode and disallow edits.This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting, you can configure the f...
V-223343
LOWMEDIUMHIGH
File attachments from Outlook must be opened in Excel in Protected mode.This policy setting allows you to determine if Excel files in Outlook attachments open in Protected View. If you enable this policy setting, Outlook ...
V-223344
LOWMEDIUMHIGH
The SIP security mode in Lync must be enabled.When Lync connects to the server, it supports various authentication mechanisms. This policy allows the user to specify whether Digest and Basic authe...
V-223345
LOWMEDIUMHIGH
The HTTP fallback for SIP connection in Lync must be disabled.Prevents from HTTP being used for SIP connection in case TLS or TCP fail....
V-223346
LOWMEDIUMHIGH
The Exchange client authentication with Exchange servers must be enabled to use Kerberos Password Authentication.This policy setting controls which authentication method Outlook uses to authenticate with Microsoft Exchange Server. Note: Exchange Server supports t...
V-223347
LOWMEDIUMHIGH
Outlook must use remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers.This policy setting controls whether Outlook uses remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers. If you enab...
V-223348
LOWMEDIUMHIGH
Scripts associated with public folders must be prevented from execution in Outlook.This policy setting controls whether Outlook executes scripts that are associated with custom forms or folder home pages for public folders....
V-223349
LOWMEDIUMHIGH
Scripts associated with shared folders must be prevented from execution in Outlook.This policy setting controls whether Outlook executes scripts associated with custom forms or folder home pages for shared folders....
V-223350
LOWMEDIUMHIGH
Files dragged from an Outlook e-mail to the file system must be created in ANSI format.This policy setting controls whether e-mail messages dragged from Outlook to the file system are saved in Unicode or ANSI format....
V-223351
LOWMEDIUMHIGH
The junk email protection level must be set to No Automatic Filtering.This policy setting controls the Junk E-mail protection level. The Junk E-mail Filter in Outlook helps to prevent junk email messages, also known as s...
V-223352
LOWMEDIUMHIGH
Active X One-Off forms must only be enabled to load with Outlook Controls.By default, third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Controls (Micro...
V-223353
LOWMEDIUMHIGH
Outlook must be configured to prevent users overriding attachment security settings.This policy setting prevents users from overriding the set of attachments blocked by Outlook. If you enable this policy setting users will be prevent...
V-223354
LOWMEDIUMHIGH
Internet must not be included in Safe Zone for picture download in Outlook.This policy setting controls whether pictures and external content in HTML e-mail messages from untrusted senders on the Internet are downloaded witho...
V-223355
LOWMEDIUMHIGH
The Publish to Global Address List (GAL) button must be disabled in Outlook.This policy setting controls whether Outlook users can publish e-mail certificates to the Global Address List (GAL). If you enable this policy setti...
V-223356
LOWMEDIUMHIGH
The minimum encryption key length in Outlook must be at least 168.This policy setting allows you to set the minimum key length for an encrypted e-mail message. If you enable this policy setting, you may set the mini...
V-223357
LOWMEDIUMHIGH
The warning about invalid digital signatures must be enabled to warn Outlook users.This policy setting controls how Outlook warns users about messages with invalid digital signatures. If you enable this policy setting, you can choos...
V-223358
LOWMEDIUMHIGH
Outlook must be configured to allow retrieving of Certificate Revocation Lists (CRLs) always when online.This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates. Certificate revocation lists (...
V-223359
LOWMEDIUMHIGH
The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.This policy setting controls which set of security settings are enforced in Outlook. If you enable this policy setting, you can choose from four optio...
V-223360
LOWMEDIUMHIGH
The ability to demote attachments from Level 2 to Level 1 must be disabled.This policy setting controls whether Outlook users can demote attachments to Level 2 by using a registry key, which will allow them to save files to d...
V-223361
LOWMEDIUMHIGH
The display of Level 1 attachments must be disabled in Outlook.This policy setting controls whether Outlook blocks potentially dangerous attachments designated Level 1. Outlook uses two levels of security to restr...
V-223362
LOWMEDIUMHIGH
Level 1 file attachments must be blocked from being delivered.This policy setting controls whether Outlook users can demote attachments to Level 2 by using a registry key, which will allow them to save files to d...
V-223363
LOWMEDIUMHIGH
Level 2 file attachments must be blocked from being delivered.This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can open them. Files with sp...
V-223364
LOWMEDIUMHIGH
Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.This policy setting controls whether scripts can run in Outlook forms in which the script and layout are contained within the message. If you enable t...
V-223365
LOWMEDIUMHIGH
When a custom action is executed that uses the Outlook object model, Outlook must automatically deny it.This policy setting controls whether Outlook prompts users before executing a custom action. Custom actions add functionality to Outlook that can be t...
V-223366
LOWMEDIUMHIGH
When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it.This policy setting controls what happens when an untrusted program attempts to gain access to an Address Book using the Outlook object model. If yo...
V-223367
LOWMEDIUMHIGH
When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.This policy setting controls what happens when a user designs a custom form in Outlook and attempts to bind an Address Information field to a combinat...
V-223368
LOWMEDIUMHIGH
When an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it.This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically save an item. If you ena...
V-223369
LOWMEDIUMHIGH
When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the ''To:'' field, using the...
V-223370
LOWMEDIUMHIGH
When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a...
V-223371
LOWMEDIUMHIGH
When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outlook object model. If you ...
V-223372
LOWMEDIUMHIGH
Outlook must be configured to not allow hyperlinks in suspected phishing messages.This policy setting controls whether hyperlinks in suspected phishing e-mail messages in Outlook are allowed. If you enable this policy setting, Outlo...
V-223373
LOWMEDIUMHIGH
The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.This policy setting controls the security level for macros in Outlook. If you enable this policy setting, you can choose from four options for handl...
V-223374
LOWMEDIUMHIGH
Trusted Locations on the network must be disabled in Project.This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locat...
V-223375
LOWMEDIUMHIGH
Project must automatically disable unsigned add-ins without informing users.This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ...
V-223376
LOWMEDIUMHIGH
VBA Macros not digitally signed must be blocked in Project.This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable thi...
V-223377
LOWMEDIUMHIGH
VBA Macros not digitally signed must be blocked in PowerPoint.This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable thi...
V-223378
LOWMEDIUMHIGH
The ability to run programs from PowerPoint must be disabled.This policy setting controls the prompting and activation behavior for the "Run Programs" option for action buttons in PowerPoint. If you enable this...
V-223379
LOWMEDIUMHIGH
Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of thi...
V-223380
LOWMEDIUMHIGH
The default file block behavior must be set to not open blocked files in PowerPoint.This policy setting allows you to determine if users can open, view, or edit Word files. If you enable this policy setting, you can set one of these o...
V-223381
LOWMEDIUMHIGH
Encrypted macros in PowerPoint Open XML presentations must be scanned.This policy setting controls whether encrypted macros in Open XML presentations are required to be scanned with anti-virus software before being opene...
V-223382
LOWMEDIUMHIGH
File validation in PowerPoint must be enabled.This policy setting allows you to turn off the file validation feature. If you enable this policy setting, file validation will be turned off. If you ...
V-223383
LOWMEDIUMHIGH
Macros from the Internet must be blocked from running in PowerPoint.This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros are...
V-223384
LOWMEDIUMHIGH
Unsigned add-ins in PowerPoint must be blocked with no Trust Bar Notification to the user.This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ...
V-223385
LOWMEDIUMHIGH
Files downloaded from the Internet must be opened in Protected view in PowerPoint.This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View. If you enable this policy setting, file...
V-223386
LOWMEDIUMHIGH
PowerPoint attachments opened from Outlook must be in Protected View.This policy setting allows for determining whether PowerPoint files in Outlook attachments open in Protected View. If enabling this policy setting, Ou...
V-223387
LOWMEDIUMHIGH
Files in unsafe locations must be opened in Protected view in PowerPoint.This policy setting determines whether files located in unsafe locations will open in Protected View. If unsafe locations have not been specified, onl...
V-223388
LOWMEDIUMHIGH
If file validation fails, files must be opened in Protected view in PowerPoint with ability to edit disabled.This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting, you can configure the fol...
V-223389
LOWMEDIUMHIGH
The use of network locations must be ignored in PowerPoint.This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locati...
V-223390
LOWMEDIUMHIGH
Publisher must be configured to prompt the user when another application programmatically opens a macro.This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ...
V-223391
LOWMEDIUMHIGH
Publisher must automatically disable unsigned add-ins without informing users.This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ...
V-223392
LOWMEDIUMHIGH
Publisher must disable all unsigned VBA macros.This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If this policy se...
V-223393
LOWMEDIUMHIGH
VBA Macros not digitally signed must be blocked in Visio.This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable thi...
V-223394
LOWMEDIUMHIGH
Trusted Locations on the network must be disabled in Visio.This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locat...
V-223395
LOWMEDIUMHIGH
Visio must automatically disable unsigned add-ins without informing users.This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ...
V-223396
LOWMEDIUMHIGH
Visio 2000-2002 Binary Drawings, Templates and Stencils must be blocked.This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting. ...
V-223397
LOWMEDIUMHIGH
Visio 2003-2010 Binary Drawings, Templates and Stencils must be blocked.This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting. ...
V-223398
LOWMEDIUMHIGH
Visio 5.0 or earlier Binary Drawings, Templates and Stencils must be blocked.This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting. ...
V-223399
LOWMEDIUMHIGH
Macros must be blocked from running in Visio files from the Internet.This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros ar...
V-223400
LOWMEDIUMHIGH
Word must automatically disable unsigned add-ins without informing users.This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ...
V-223401
LOWMEDIUMHIGH
In Word, encrypted macros must be scanned.This policy setting controls whether encrypted macros in Open XML documents be are required to be scanned with anti-virus software before being opened...
V-223402
LOWMEDIUMHIGH
Files downloaded from the Internet must be opened in Protected view in Word.This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View. If you enable this policy setting, fil...
V-223403
LOWMEDIUMHIGH
Files located in unsafe locations must be opened in Protected view in Word.This policy setting lets you determine if files located in unsafe locations will open in Protected View. If you have not specified unsafe locations, o...
V-223404
LOWMEDIUMHIGH
If file validation fails, files must be opened in Protected view in Word with ability to edit disabled.This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting, you can configure the f...
V-223405
LOWMEDIUMHIGH
Word attachments opened from Outlook must be in Protected View.This policy setting allows you to determine if Word files in Outlook attachments open in Protected View. If you enable this policy setting, Outlook a...
V-223406
LOWMEDIUMHIGH
The default file block behavior must be set to not open blocked files in Word.This policy setting allows you to determine if users can open, view, or edit Word files. If you enable this policy setting, you can set one of these ...
V-223407
LOWMEDIUMHIGH
Open/Save of Word 2 and earlier binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223408
LOWMEDIUMHIGH
Open/Save of Word 2000 binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223409
LOWMEDIUMHIGH
Open/Save of Word 2003 binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223410
LOWMEDIUMHIGH
Open/Save of Word 2007 and later binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223411
LOWMEDIUMHIGH
Open/Save of Word 6.0 binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223412
LOWMEDIUMHIGH
Open/Save of Word 95 binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223413
LOWMEDIUMHIGH
Open/Save of Word 97 binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223414
LOWMEDIUMHIGH
Open/Save of Word XP binary documents and templates must be blocked.This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli...
V-223415
LOWMEDIUMHIGH
In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center.This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros are...
V-223416
LOWMEDIUMHIGH
Trusted Locations on the network must be disabled in Word.This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locat...
V-223417
LOWMEDIUMHIGH
VBA Macros not digitally signed must be blocked in Word.This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable thi...
V-223418
LOWMEDIUMHIGH
File validation in Word must be enabled.This policy setting allows the file validation feature to be turned off. If this policy setting is enabled, file validation will be turned off. If t...
V-223285
LOWMEDIUMHIGH
Document metadata for rights managed Office Open XML files must be protected.This policy setting determines whether metadata is encrypted in Office Open XML files that are protected by Information Rights Management (IRM). If th...