Checked | Name | Title |
---|
☐ | SV-33895r1_rule | Disabling of user name and password syntax from being used in URLs must be enforced. |
☐ | SV-33890r1_rule | Enabling IE Bind to Object functionality must be present. |
☐ | SV-33919r1_rule | Saved from URL mark to assure Internet zone processing must be enforced. |
☐ | SV-33900r1_rule | Navigation to URL's embedded in Office products must be blocked. |
☐ | SV-33894r1_rule | Links that invoke instances of IE from within an Office product must be blocked. |
☐ | SV-33928r1_rule | Trust Bar Notifications for unsigned application add-ins must be blocked. |
☐ | SV-33930r1_rule | Warning Bar settings for VBA macros must be configured. |
☐ | SV-33887r2_rule | Add-on Management functionality must be allowed. |
☐ | SV-33901r1_rule | Protection from zone elevation must be enforced. |
☐ | SV-33905r1_rule | ActiveX Installs must be configured for proper restriction. |
☐ | SV-33916r1_rule | File Downloads must be configured for proper restrictions. |
☐ | SV-33922r1_rule | Scripted Window Security must be enforced. |
☐ | SV-33929r1_rule | Application add-ins must be signed by Trusted Publisher. |
☐ | SV-33926r1_rule | Data Execution Prevention must be enforced. |
☐ | SV-34092r1_rule | Fatally corrupt files must be blocked from opening. |
☐ | SV-34093r1_rule | The Publisher Automation Security Level must be configured for high security. |