| V-71041 | | Disabling of user name and password syntax from being used in URLs must be enforced. | The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:password@example.com.... |
| V-71043 | | Blocking as default file block opening behavior must be enforced. | This policy setting allows you to determine if users can open, view, or edit Word files. If you enable this policy setting, you can set one of these o... |
| V-71045 | | The Internet Explorer Bind to Object functionality must be enabled. | Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the ... |
| V-71047 | | Saved from URL mark to assure Internet zone processing must be enforced. | Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indi... |
| V-71049 | | Configuration for file validation must be enforced. | This policy setting allows you to turn off the file validation feature. If you enable this policy setting, file validation will be turned off. If you ... |
| V-71051 | | Files from the Internet zone must be opened in Protected View. | This policy setting allows for determining if files downloaded from the Internet zone open in Protected View. If enabling this policy setting, files d... |
| V-71053 | | Navigation to URLs embedded in Office products must be blocked. | To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for ... |
| V-71055 | | Scripted Window Security must be enforced. | Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the use... |
| V-71057 | | Add-on Management functionality must be allowed. | Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or othe... |
| V-71059 | | Add-ins to Office applications must be signed by a Trusted Publisher. | This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher. If you enable this policy setting,... |
| V-71061 | | Links that invoke instances of Internet Explorer from within an Office product must be blocked. | The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can... |
| V-71063 | | Trust Bar Notifications for unsigned application add-ins must be blocked. | This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable ... |
| V-71065 | | File Downloads must be configured for proper restrictions. | Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferenc... |
| V-71067 | | All automatic loading from trusted locations must be disabled. | This policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Cen... |
| V-71069 | | Disallowance of trusted locations on the network must be enforced. | This policy setting controls whether trusted locations on the network can be used. If you enable this policy setting, users can specify trusted locati... |
| V-71071 | | The Save commands default file format must be configured. | This policy setting determines the default file format for saving files in Word. If you enable this policy setting, you can set the default file forma... |
| V-71073 | | Force encrypted macros to be scanned in open XML documents must be determined and configured. | This policy setting controls whether encrypted macros in Open XML documents be are required to be scanned with anti-virus software before being opened... |
| V-71075 | | Trust access for VBA must be disallowed. | This policy setting controls whether automation clients such as Microsoft Visual Studio 2005 Tools for Microsoft Office (VSTO) can access the Visual B... |
| V-71077 | | Protection from zone elevation must be enforced. | Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest securit... |
| V-71079 | | ActiveX Installs must be configured for proper restriction. | Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in... |
| V-71081 | | Files in unsafe locations must be opened in Protected View. | This policy setting determines whether files located in unsafe locations will open in Protected View. If unsafe locations have not been specified, onl... |
| V-71083 | | Document behavior if file validation fails must be set. | This policy setting controls how Office handles documents when they fail file validation. If you enable this policy setting, you can configure the fol... |
| V-71085 | | Attachments opened from Outlook must be in Protected View. | This policy setting allows for determining whether Word files in Outlook attachments open in Protected View. If enabling this policy setting, Outlook ... |
| V-71087 | | The automatically update links feature must be disabled. | When users open documents Word automatically updates any links to external content, such as graphics, Excel worksheets, and PowerPoint slides. To disa... |
| V-71089 | | Warning Bar settings for VBA macros must be configured. | This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable this... |
| V-71091 | | Online translation dictionaries must not be used. | This policy setting allows you to prevent online dictionaries from being used for the translation of text through the Research pane. If you enable or ... |
| V-71093 | | Word 2 and earlier binary documents and templates must be blocked for open/save. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-71095 | | Word 2000 binary documents and templates must be configured to edit in protected view. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-71097 | | Word 6.0 binary documents and templates must be configured for block open/save actions. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-71099 | | Word 95 binary documents and templates must be configured to edit in protected view. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-71101 | | Word 97 binary documents and templates must be configured to edit in protected view. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-71103 | | Word XP binary documents and templates must be configured to edit in protected view. | This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this poli... |
| V-71107 | | Macros must be blocked from running in Office files from the Internet. | This policy setting allows you to block macros from running in Office files that come from the Internet. If you enable this policy setting, macros ar... |
| V-71643 | | Files on local Intranet UNC must be opened in Protected View. | This policy setting lets you determine if files on local Intranet UNC file shares open in Protected View. If you enable this policy setting, files on ... |