| V-70729 | | Disabling of user name and password syntax from being used in URLs must be enforced. | The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com.... |
| V-70731 | | Enabling IE Bind to Object functionality must be present. | Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the ... |
| V-70733 | | Saved from URL mark to assure Internet zone processing must be enforced. | Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indi... |
| V-70735 | | Navigation to URLs embedded in Office products must be blocked. | To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for ... |
| V-70747 | | Scripted Window Security must be enforced. | Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the use... |
| V-70749 | | Add-on Management functionality must be allowed. | Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or othe... |
| V-70751 | | Add-ins to Office applications must be signed by a Trusted Publisher. | This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher. If you enable this policy setting,... |
| V-70753 | | Links that invoke instances of Internet Explorer from within an Office product must be blocked. | The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can... |
| V-70755 | | Trust Bar Notifications for unsigned application add-ins must be blocked. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-70757 | | File Downloads must be configured for proper restrictions. | Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferenc... |
| V-70759 | | Protection from zone elevation must be enforced. | Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit... |
| V-70761 | | ActiveX Installs must be configured for proper restriction. | Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in... |
| V-70763 | | Warning Bar settings for VBA macros must be configured. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable this... |
| V-71673 | | Fatally corrupt files must be blocked from opening. | When disabled, fatally corrupt files are prevented from opening. When enabled, the user is warned but may choose to open the file.By default, fatally ... |
| V-71675 | | The Publisher Automation Security Level must be configured for high security. | This policy setting controls whether macros opened programmatically by another application can run in Publisher.If you enable this policy setting, you... |