| V-70953 ||Medium ||Warning Bar settings for VBA macros must be configured.
||This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present. If you enable this policy setting, you can choose from four... |
| V-70927 ||Medium ||Saved from URL mark to assure Internet zone processing must be enforced.
||Typically, when Internet Explorer loads a web page from a Universal Naming Convention (UNC) share that contains a Mark of the Web (MOTW) comment, indicating the page was saved from a site on the... |
| V-70951 ||Medium ||ActiveX Installs must be configured for proper restriction.
||Microsoft ActiveX controls allow unmanaged, unprotected code to run on the user computers. ActiveX controls do not run within a protected container in the browser like the other types of HTML or... |
| V-70925 ||Medium ||Enabling IE Bind to Object functionality must be present.
||Internet Explorer performs a number of safety checks before initializing an ActiveX control. It will not initialize a control if the kill bit for the control is set in the registry, or if the... |
| V-70945 ||Medium ||Database functionality configurations must be displayed to the user.
||This policy setting controls how Access notifies users about untrusted components. If you enable this policy setting, when users attempt to open an untrusted Access database that contains... |
| V-70941 ||Medium ||Trust Bar Notifications for unsigned application add-ins must be blocked.
||This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy... |
| V-70949 ||Medium ||Protection from zone elevation must be enforced.
||Internet Explorer places restrictions on each web page users can use the browser to open. Web pages on a user's local computer have the fewest security restrictions and reside in the Local Machine... |
| V-70947 ||Medium ||The Save commands default file format must be configured.
||This policy setting controls whether new database files are created in the new Access format or in a format used by earlier versions of Access. If you enable this policy setting, you can specify... |
| V-70929 ||Medium ||Navigation to URLs embedded in Office products must be blocked.
||To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by... |
| V-70939 ||Medium ||The configuration for enabling of hyperlinks must be enforced.
||This policy setting controls whether hyperlinks in Access tables, queries, forms, and reports are underlined. If you enable this policy setting, Access underlines all hyperlinks in tables,... |
| V-70943 ||Medium ||File Downloads must be configured for proper restrictions.
||Disabling this setting allows websites to present file download prompts via code without the user specifically initiating the download. User preferences may also allow the download to occur... |
| V-70931 ||Medium ||Scripted Window Security must be enforced.
||Malicious websites often try to confuse or trick users into giving a site permission to perform an action allowing the site to take control of the users' computers in some manner. Disabling or not... |
| V-70933 ||Medium ||Add-on Management functionality must be allowed.
||Internet Explorer add-ons are pieces of code, run in Internet Explorer, to provide additional functionality. Rogue add-ons may contain viruses or other malicious code. Disabling or not configuring... |
| V-70907 ||Medium ||Disabling of user name and password syntax from being used in URLs must be enforced.
||The Uniform Resource Locator (URL) standard allows user authentication to be included in URL strings in the form http://username:email@example.com. A malicious user might use this URL syntax to... |
| V-70935 ||Medium ||Add-ins to Office applications must be signed by a Trusted Publisher.
||This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher. If you enable this policy setting, this application checks the digital signature... |
| V-70937 ||Medium ||Links that invoke instances of Internet Explorer from within an Office product must be blocked.
||The Pop-up Blocker feature in Internet Explorer can be used to block most unwanted pop-up and pop-under windows from appearing. This functionality can be controlled separately for instances of... |