Adobe Reader DC must enable Enhanced Security in a Standalone Application.
Adobe Reader DC must enable Enhanced Security in a Browser.
Adobe Reader DC must enable Protected Mode.
Adobe Reader DC must enable Protected View.
Adobe Reader DC must Block Websites.
Adobe Reader DC must block access to Unknown Websites.
Adobe Reader DC must prevent opening files other than PDF or FDF.
Adobe Reader DC must block Flash Content.
The Mainframe Product must prevent the automatic execution of mobile code in, at a minimum, office applications, browsers, email clients, mobile code run-time environments, and mobile agent systems.
Disabling of user name and password syntax from being used in URLs must be enforced.
Saved from URL mark to assure Internet zone processing must be enforced.
Navigation to URLs embedded in Office products must be blocked.
The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint.
All automatic loading from trusted locations must be disabled.
Disallowance of trusted locations on the network must be enforced.
The scanning of encrypted macros in open XML documents must be enforced.
The ability to run programs from a PowerPoint presentation must be disallowed.
Attachments opened from Outlook must be in Protected View.
Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint Viewer.
The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint Viewer.
Navigation to URLs embedded in Office products must be blocked in PowerPoint Viewer.
Macros must be blocked from running in Office files from the Internet.
Navigation to URLs embedded in Office products must be blocked in PowerPoint.
Files in unsafe locations must be opened in Protected View.
Document behavior if file validation fails must be set.
Files on local Intranet UNC must be opened in Protected View.
Untrusted intranet zone access to Project servers must not be allowed.
Force encrypted macros to be scanned in open XML documents must be determined and configured.
Files in unsafe locations must be opened in Protected View.
Document behavior if file validation fails must be set.
The automatically update links feature must be disabled.
Online translation dictionaries must not be used.
Disabling of user name and password syntax from being used in URLs must be enforced.
Saved from URL mark to assure Internet zone processing must be enforced.
Navigation to URL's embedded in Office products must be blocked.
Data Execution Prevention must be enforced.
Navigation to URLs embedded in Office products must be blocked.
All automatic loading from Trusted Locations must be disabled.
Force encrypted macros to be scanned in open XML documents must be determined and configured.
Disallowance of Trusted Locations on the network must be enforced.
Microsoft Defender AV must be configured to disable local setting override for reporting to Microsoft MAPS.
Microsoft Defender AV must be configured to join Microsoft MAPS.
Microsoft Defender AV must be configured to only send safe samples for MAPS telemetry.
Microsoft Defender AV must be configured to not allow override of behavior monitoring.
Microsoft Defender AV must be configured to enable behavior monitoring.
Microsoft Defender AV must be configured to turn on e-mail scanning.
Microsoft Defender AV must be configured to block executable content from email client and webmail.
Microsoft Defender AV must be configured block Office applications from creating child processes.
Microsoft Defender AV must be configured block Office applications from creating executable content.
Microsoft Defender AV must be configured to block Office applications from injecting into other processes.
Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.
Microsoft Defender AV must be configured to block execution of potentially obfuscated scripts.
Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.
Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.
Macro storage must be in personal macro workbooks.
Internet links and Network UNCs created as embedded hyperlinks must be prevented.
Load pictures from Web pages must be disallowed.
Macro storage must be in Personal macro workbooks.
Attachments opened from Outlook must be in Protected View.
The Saved from URL mark must be selected to enforce Internet zone processing.
All automatic loading from trusted locations must be disabled.
The scanning of encrypted macros in open XML documents must be enforced.
Disallowance of trusted locations on the network must be enforced.
The loading of images from web pages must not be allowed.
Macro storage must be in personal macro workbooks.
Excel attachments opened from Outlook must be in Protected View.
Macros must be blocked from running in Office 2013 files from the Internet.
Excel attachments opened from Outlook must be in Protected View.
Email with InfoPath forms must be configured to show UI to recipients.
Dynamic caching of InfoPath eMail forms must be disabled.
Disabling of email forms from the Full Trust Security Zone must be configured.
Disabling email forms from the Internet Security Zone must be configured.
Disabling email forms running in Restricted Security Level must be configured.
Disabling the opening of solutions from the Internet Security Zone must be configured.
Disabling sending form templates with the email forms must be configured.
InfoPath 2003 forms as email forms in InfoPath 2010 must be disallowed.
Unsafe file types must be prevented from being attached to InfoPath forms.
InfoPath must be enforced to not use e-mail forms from the Intranet security zone.
InfoPath e-mail forms in Outlook must be disallowed.
Disabling opening forms with managed code from the Internet security zone must be configured.
Email with InfoPath forms must be configured to show UI to recipients.
Disable dynamic caching of the form template in InfoPath eMail forms.
Disabling sending form templates with the email forms must be configured.
InfoPath 2003 forms as email forms in InfoPath 2013 must be disallowed.
Unsafe file types must be prevented from being attached to InfoPath forms.
InfoPath must be enforced to not use email forms from the Intranet security zone.
InfoPath email forms in Outlook must be disallowed.
Disabling opening forms with managed code from the Internet security zone must be configured.
Documents must be configured to not open as Read Write when browsing.
Relying on Vector markup Language (VML) for displaying graphics in browsers must be disallowed.
Automation Security to enforce macro level security in Office documents must be configured.
The ability to create an online presentation programmatically must be disabled.
ActiveX One-Off forms must be configured.
Scripts in One-Off Outlook forms must be disallowed.
The Add-In Trust Level must be configured.
Outlook Object Model scripts must be disallowed to run for public folders.
Outlook Object Model scripts must be disallowed to run for shared folders.
Users customizing attachment security settings must be prevented.
Automation Security to enforce macro level security in Office documents must be configured.
The ability to create an online presentation programmatically must be disabled.
Vector markup Language (VML) for displaying graphics in browsers must be disallowed.
Customer-submitted templates downloads from Office.com must be disallowed.
Disable user name and password syntax from being used in URLs
Active X One-Off forms must be configured.
Outlook Object Model scripts must be disallowed to run for shared folders.
Outlook Object Model scripts must be disallowed to run for public folders.
ActiveX One-Off forms must be configured.
The Add-In Trust Level must be configured.
Users customizing attachment security settings must be prevented.
Scripts in One-Off Outlook forms must be disallowed.
Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint.
The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint.
Enforce encrypted macros to be scanned in open XML documents must be determined and configured.
Disallowance of Trusted Locations on the network must be enforced.
The ability to run programs from a PowerPoint presentation must be disallowed.
Disabling of user name and password syntax from being used in URLs must be enforced in PowerPoint Viewer.
The Saved from URL mark must be selected to enforce Internet zone processing in PowerPoint Viewer.
The Publisher Automation Security Level must be configured for high security.
The Saved from URL mark must be selected to enforce Internet zone processing
Navigation to URLs embedded in Office products must be blocked in PowerPoint Viewer.
Untrusted intranet zone access to Project servers must not be allowed.
The Publisher Automation Security Level must be configured for high security.
The automatically update links feature must be disabled.
Online translation dictionaries must not be used.
Macros must be blocked from running in Office 2013 files from the Internet.
The automatically update links feature must be configured as off.
Online translation dictionaries must be in use.
Extensions that are approved for use must be allowlisted.
URLs must be allowlisted for Autoplay use.
The Initialize and script ActiveX controls not marked as safe property must be disallowed (Internet zone).
Prevent per-user installation of ActiveX controls must be enabled.
The Initialize and script ActiveX controls not marked as safe must be disallowed (Intranet Zone).
The Initialize and script ActiveX controls not marked as safe must be disallowed (Trusted Sites Zone).
The Initialize and script ActiveX controls not marked as safe property must be disallowed (Restricted Sites zone).
ActiveX controls marked safe for scripting must be disallowed (Restricted Sites zone).
Software must be disallowed to run or install with invalid signatures.
The Macro Runtime Scan Scope must be enabled for all documents.
Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.
User name and password must be disabled in all Office programs.
Navigate URL must be enabled in all Office programs.
The Save from URL feature must be enabled in all Office programs.
Trusted Locations on the network must be disabled in Excel.
Updating of links in Excel must be prompted and not automatic.
Scan of encrypted macros in Excel Open XML workbooks must be enabled.
Macros must be blocked from running in Excel files from the Internet.
Files from unsafe locations must be opened in Excel in Protected View mode.
Files failing file validation must be opened in Excel in Protected view mode and disallow edits.
File attachments from Outlook must be opened in Excel in Protected mode.
ActiveX controls without prompt property must be used in approved domains only (Internet zone).
ActiveX controls without prompt property must be used in approved domains only (Restricted Sites zone).
Scripts associated with public folders must be prevented from execution in Outlook.
Scripts associated with shared folders must be prevented from execution in Outlook.
Active X One-Off forms must only be enabled to load with Outlook Controls.
Outlook must be configured to not run scripts in forms in which the script and the layout are contained within the message.
Trusted Locations on the network must be disabled in Project.
The ability to run programs from PowerPoint must be disabled.
Encrypted macros in PowerPoint Open XML presentations must be scanned.
File validation in PowerPoint must be enabled.
Macros from the Internet must be blocked from running in PowerPoint.
If file validation fails, files must be opened in Protected view in PowerPoint with ability to edit disabled.
The use of network locations must be ignored in PowerPoint.
Trusted Locations on the network must be disabled in Visio.
Macros must be blocked from running in Visio files from the Internet.
In Word, encrypted macros must be scanned.
In Word, macros must be blocked from running, even if Enable all macros is selected in the Macro Settings section of the Trust Center.
Trusted Locations on the network must be disabled in Word.
The operating system must disable information system functionality that provides the capability for automatic execution of code on mobile devices without user direction.
The system must restrict the ability of users to assume excessive privileges to members of a defined group and prevent unauthorized users from accessing administrative tools.
Extensions that are approved for use must be allowlisted.