| V-70641 | | Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint. | The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com.... |
| V-70643 | | Blocking as default file block opening behavior must be enforced. | This policy setting allows you to determine if users can open, view, or edit Word files. If you enable this policy setting, you can set one of these o... |
| V-70645 | | The Internet Explorer Bind to Object functionality must be enabled in PowerPoint. | Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the ... |
| V-70647 | | The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint. | Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indi... |
| V-70649 | | Configuration for file validation must be enforced. | This policy setting allows you to turn off the file validation feature. If you enable this policy setting, file validation will be turned off. If you... |
| V-70651 | | Files from the Internet zone must be opened in Protected View. | This policy setting allows you to determine if files downloaded from the Internet zone open in Protected View. If you enable this policy setting, file... |
| V-70653 | | Add-on Management functionality must be allowed in PowerPoint. | Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or othe... |
| V-70655 | | Add-ins to Office applications must be signed by a Trusted Publisher. | This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher. If you enable this policy setting,... |
| V-70657 | | Links that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint. | The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can... |
| V-70659 | | Trust Bar Notifications for unsigned application add-ins must be blocked. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-70661 | | File Downloads must be configured for proper restrictions in PowerPoint. | Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferenc... |
| V-70663 | | All automatic loading from trusted locations must be disabled. | This policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Cen... |
| V-70665 | | Disallowance of trusted locations on the network must be enforced. | This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locati... |
| V-70667 | | The Save commands default file format must be configured. | This policy setting governs the default format for new presentation files that users create. If you enable this policy setting, when a user creates a ... |
| V-70669 | | The scanning of encrypted macros in open XML documents must be enforced. | This policy setting controls whether encrypted macros in Open XML presentations are required to be scanned with anti-virus software before being opene... |
| V-70671 | | Trust access for VBA must be disallowed. | This policy setting controls whether automation clients such as Microsoft Visual Studio 2005 Tools for Microsoft Office (VSTO) can access the Visual B... |
| V-70673 | | Protection from zone elevation must be enforced in PowerPoint. | Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit... |
| V-70675 | | ActiveX Installs must be configured for proper restriction in PowerPoint. | Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in... |
| V-70677 | | The ability to run programs from a PowerPoint presentation must be disallowed. | This policy setting controls the prompting and activation behavior for the "Run Programs" option for action buttons in PowerPoint. If you enable this ... |
| V-70679 | | Attachments opened from Outlook must be in Protected View. | This policy setting allows for determining whether PowerPoint files in Outlook attachments open in Protected View. If enabling this policy setting, Ou... |
| V-70681 | | Warning Bar settings for VBA macros must be configured. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable this... |
| V-70683 | | Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint Viewer. | The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com.... |
| V-70685 | | The Internet Explorer Bind to Object functionality must be enabled in PowerPoint Viewer. | Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the ... |
| V-70687 | | The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint Viewer. | Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indi... |
| V-70689 | | Navigation to URLs embedded in Office products must be blocked in PowerPoint Viewer. | To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for ... |
| V-70691 | | Scripted Window Security must be enforced in PowerPoint Viewer. | Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the use... |
| V-70693 | | Add-on Management functionality must be allowed in PowerPoint Viewer. | Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or othe... |
| V-70695 | | Links that invoke instances of Internet Explorer from within an Office product must be blocked in PowerPoint Viewer. | The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can... |
| V-70697 | | Protection from zone elevation must be enforced in PowerPoint Viewer. | Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit... |
| V-70699 | | ActiveX Installs must be configured for proper restriction in PowerPoint Viewer. | Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in... |
| V-70701 | | Macros must be blocked from running in Office files from the Internet. | This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros ar... |
| V-71401 | | Navigation to URLs embedded in Office products must be blocked in PowerPoint. | To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for ... |
| V-71403 | | Scripted Window Security must be enforced in PowerPoint. | Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the use... |
| V-71405 | | Files in unsafe locations must be opened in Protected View. | This policy setting determines whether files located in unsafe locations will open in Protected View. If unsafe locations have not been specified, onl... |
| V-71407 | | Document behavior if file validation fails must be set. | This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting, you can configure the fol... |
| V-71641 | | Files on local Intranet UNC must be opened in Protected View. | This policy setting lets you determine if files on local Intranet UNC file shares open in Protected View. If you enable this policy setting, files on ... |
| V-71647 | | File Downloads must be configured for proper restrictions in PowerPoint Viewer. | Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferenc... |